Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of pkc 2001
Page
Title
1-18
On the Security of Williams Based Public Key Encryption Scheme
19-35
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC
36-47
IND-CCA Public Key Schemes Equivalent to Factoring n=pq
48-63
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite
64-72
On the Security of Lenstra's Variant of DSA without Long Inversions
73-86
Fast Irreducibility and Subgroup Membership Testing in XTR
87-103
A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes
104-118
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
119-136
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
137-152
Marking: A Privacy Protecting Approach Against Blackmailing
153-164
Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems
165-172
Cryptanalysis of PKP: A New Approach
173-179
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
180-189
Loopholes in Two Public Key Cryptosystems Using the Modular Group
190-206
Efficient Revocation in Group Signatures
207-224
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
225-239
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability
240-263
Adaptive Security for the Additive-Sharing Based Proactive RSA
264-276
Robust Forward-Secure Signature Schemes with Proactive Security
277-286
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow
287-299
A PVSS as Hard as Discrete Log and Shareholder Separability
300-316
One Round Threshold Discrete-Log Key Generation without Private Channels
317-324
Remarks on Mix-Network Based on Permutation Networks
325-338
New Key Recovery in WAKE Protocol
339-352
Redundant Representation of Finite Fields
353-364
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography
365-382
Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers
383-401
Secure Server-Aided Signature Generation
402-415
Efficient Long-Term Validation of Digital Signatures
416-421
A Novel Systolic Architecture for Efficient RSA Implementation