Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of pkc 2008
Preface and frontmatter
Page
Title
1-17
Total Break of the
l
-IC Signature Scheme
18-36
Recovering NTRU Secret Key from Inversion Oracles
37-46
Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?
47-64
Relations Among Notions of Plaintext Awareness
65-84
Completely Non-malleable Encryption Revisited
85-100
Cryptographic Test Correction
101-120
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
121-140
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
141-161
Proxy Signatures Secure Against Proxy Key Exposure
162-179
Lattice-Based Identification Schemes Secure Under Active Attacks
180-196
Efficient Simultaneous Broadcast
197-213
SAS-Based Group Authentication and Key Agreement Protocols
214-228
An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm
229-247
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields
248-267
Online-Untransferable Signatures
268-287
Security of Digital Signature Schemes in Weakened Random Oracle Models
288-307
A Digital Signature Scheme Based on CVP
infinity
308-327
An Analysis of the Vector Decomposition Problem
328-343
A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents
344-359
Certificateless Encryption Schemes Strongly Secure in the Standard Model
360-379
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
380-396
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time