Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of pkc 2000
Page
Title
1-13
A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol
14-27
An Efficient NICE-Schnorr-Type Signature Scheme
28-45
Identification of Bad Signatures in Batches
46-57
Some Remarks on a Fair Exchange Protocol
58-67
Gaudry's Variant against C
ab
Curves
68-74
An Identification Scheme Based on Sparse Polynomials
75-92
A State-Based Model for Certificate Management Systems
93-112
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence
113-128
The Composite Discrete Logarithm and Secure Authentication
129-146
Chosen-Ciphertext Security for Any One-Way Cryptosystem
147-166
Short Proofs of Knowledge for Factoring
167-177
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms
178-195
All-or-Nothing Transform and Remotely Keyed Encription Protocols
196-209
Security of Public Key Certificate Based Authentication Protocols
210-222
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2
223-237
Key Recovery in Third Generation Wireless Communication Systems
238-257
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications
258-275
Certificates of Recoverability with Scale Recovery Agent Security
276-292
Design Validations for Discrete Logarithm Based Signature Schemes
293-305
Optimally Efficient Accountable Time-Stamping
306-325
"Psyeudorandom Intermixing": A Tool for Shared Cryptography
326-341
RSA-Based Auto-recoverable Cryptosystems
342-353
Efficient and Fresh Cerification
354-373
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions
373-390
Cryptographic Approaches to Provacy in Forensic DNA Databases
391-404
Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes
405-421
Fast Implementation of Elliptic Curve Arithmetic in GF(p
n
)
422-432
An Auction Protocol Which Hides Bids of Losers
433-445
Forward Secrecy and Its Application to Future Mobile Communications Security
446-465
Selecting Cryptographic Key Sizes
466-483
A Structured ElGamal-Type Multisignature Scheme