Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/pkc/pkc2000.bht:"
@inproceedings{DBLP:conf/pkc/Arita00, author = {Seigo Arita}, editor = {Hideki Imai and Yuliang Zheng}, title = {Gaudry's Variant against C\({}_{\mbox{ab}}\) Curves}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {58--67}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_5}, doi = {10.1007/978-3-540-46588-1\_5}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Arita00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BanksLS00, author = {William D. Banks and Daniel Lieman and Igor E. Shparlinski}, editor = {Hideki Imai and Yuliang Zheng}, title = {An Identification Scheme Based on Sparse Polynomials}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {68--74}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_6}, doi = {10.1007/978-3-540-46588-1\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BanksLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BohannonJS00, author = {Philip Bohannon and Markus Jakobsson and Sukamol Srikwan}, editor = {Hideki Imai and Yuliang Zheng}, title = {Cryptographic Approaches to Provacy in Forensic {DNA} Databases}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {373--390}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_25}, doi = {10.1007/978-3-540-46588-1\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BohannonJS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrickellPVY00, author = {Ernest F. Brickell and David Pointcheval and Serge Vaudenay and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Design Validations for Discrete Logarithm Based Signature Schemes}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {276--292}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_19}, doi = {10.1007/978-3-540-46588-1\_19}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BrickellPVY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BuldasLS00, author = {Ahto Buldas and Helger Lipmaa and Berry Schoenmakers}, editor = {Hideki Imai and Yuliang Zheng}, title = {Optimally Efficient Accountable Time-Stamping}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {293--305}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_20}, doi = {10.1007/978-3-540-46588-1\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BuldasLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BurmesterDDMOTY00, author = {Mike Burmester and Yvo Desmedt and Hiroshi Doi and Masahiro Mambo and Eiji Okamoto and Mitsuru Tada and Yuko Yoshifuji}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Structured ElGamal-Type Multisignature Scheme}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {466--483}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_31}, doi = {10.1007/978-3-540-46588-1\_31}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BurmesterDDMOTY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CramerDM00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Philip D. MacKenzie}, editor = {Hideki Imai and Yuliang Zheng}, title = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {354--373}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_24}, doi = {10.1007/978-3-540-46588-1\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CramerDM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FrankelMY00, author = {Yair Frankel and Philip D. MacKenzie and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {"Psyeudorandom Intermixing": {A} Tool for Shared Cryptography}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {306--325}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_21}, doi = {10.1007/978-3-540-46588-1\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FrankelMY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GasskoGM00, author = {Irene Gassko and Peter Gemmell and Philip D. MacKenzie}, editor = {Hideki Imai and Yuliang Zheng}, title = {Efficient and Fresh Cerification}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {342--353}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_23}, doi = {10.1007/978-3-540-46588-1\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GasskoGM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuhnleinM00, author = {Detlef H{\"{u}}hnlein and Johannes Merkle}, editor = {Hideki Imai and Yuliang Zheng}, title = {An Efficient NICE-Schnorr-Type Signature Scheme}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {14--27}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_2}, doi = {10.1007/978-3-540-46588-1\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HuhnleinM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/InoueS00, author = {Toro Inoue and Kouichi Sakurai}, editor = {Hideki Imai and Yuliang Zheng}, title = {Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {391--404}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_26}, doi = {10.1007/978-3-540-46588-1\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/InoueS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IzuKY00, author = {Tetsuya Izu and Jun Kogure and Kazuhiro Yokoyama}, editor = {Hideki Imai and Yuliang Zheng}, title = {Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {210--222}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_15}, doi = {10.1007/978-3-540-46588-1\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IzuKY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KohlasM00, author = {Reto Kohlas and Ueli M. Maurer}, editor = {Hideki Imai and Yuliang Zheng}, title = {Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {93--112}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_8}, doi = {10.1007/978-3-540-46588-1\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KohlasM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LenstraV00, author = {Arjen K. Lenstra and Eric R. Verheul}, editor = {Hideki Imai and Yuliang Zheng}, title = {Selecting Cryptographic Key Sizes}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {446--465}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_30}, doi = {10.1007/978-3-540-46588-1\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LenstraV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LimH00, author = {Chae Hoon Lim and Hyo Sun Hwang}, editor = {Hideki Imai and Yuliang Zheng}, title = {Fast Implementation of Elliptic Curve Arithmetic in GF(p\({}^{\mbox{n}}\))}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {405--421}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_27}, doi = {10.1007/978-3-540-46588-1\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LimH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuOHC00, author = {Chuchang Liu and Maris A. Ozols and Marie Henderson and Anthony Cant}, editor = {Hideki Imai and Yuliang Zheng}, title = {A State-Based Model for Certificate Management Systems}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {75--92}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_7}, doi = {10.1007/978-3-540-46588-1\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiuOHC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OkeyaS00, author = {Katsuyuki Okeya and Hiroyuki Kurumatani and Kouichi Sakurai}, editor = {Hideki Imai and Yuliang Zheng}, title = {Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {238--257}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_17}, doi = {10.1007/978-3-540-46588-1\_17}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OkeyaS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ParkBD00, author = {Juanma Gonz{\'{a}}lez Nieto and DongGook Park and Colin Boyd and Ed Dawson}, editor = {Hideki Imai and Yuliang Zheng}, title = {Key Recovery in Third Generation Wireless Communication Systems}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {223--237}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_16}, doi = {10.1007/978-3-540-46588-1\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ParkBD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ParkBM00, author = {DongGook Park and Colin Boyd and Sang{-}Jae Moon}, editor = {Hideki Imai and Yuliang Zheng}, title = {Forward Secrecy and Its Application to Future Mobile Communications Security}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {433--445}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_29}, doi = {10.1007/978-3-540-46588-1\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ParkBM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PastuszakMS00, author = {Jaroslaw Pastuszak and Dariusz Michatek and Josef Pieprzyk and Jennifer Seberry}, editor = {Hideki Imai and Yuliang Zheng}, title = {Identification of Bad Signatures in Batches}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {28--45}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_3}, doi = {10.1007/978-3-540-46588-1\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/PastuszakMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Pointcheval00, author = {David Pointcheval}, editor = {Hideki Imai and Yuliang Zheng}, title = {The Composite Discrete Logarithm and Secure Authentication}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {113--128}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_9}, doi = {10.1007/978-3-540-46588-1\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Pointcheval00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Pointcheval00a, author = {David Pointcheval}, editor = {Hideki Imai and Yuliang Zheng}, title = {Chosen-Ciphertext Security for Any One-Way Cryptosystem}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {129--146}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_10}, doi = {10.1007/978-3-540-46588-1\_10}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Pointcheval00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PoupardS00, author = {Guillaume Poupard and Jacques Stern}, editor = {Hideki Imai and Yuliang Zheng}, title = {Short Proofs of Knowledge for Factoring}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {147--166}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_11}, doi = {10.1007/978-3-540-46588-1\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PoupardS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Sako00, author = {Kazue Sako}, editor = {Hideki Imai and Yuliang Zheng}, title = {An Auction Protocol Which Hides Bids of Losers}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {422--432}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_28}, doi = {10.1007/978-3-540-46588-1\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Sako00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShinSR00, author = {Sang{-}Uk Shin and Weon Shin and Kyung Hyune Rhee}, editor = {Hideki Imai and Yuliang Zheng}, title = {All-or-Nothing Transform and Remotely Keyed Encription Protocols}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {178--195}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_13}, doi = {10.1007/978-3-540-46588-1\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShinSR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Tzeng00, author = {Wen{-}Guey Tzeng}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {1--13}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_1}, doi = {10.1007/978-3-540-46588-1\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Tzeng00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Verheul00, author = {Eric R. Verheul}, editor = {Hideki Imai and Yuliang Zheng}, title = {Certificates of Recoverability with Scale Recovery Agent Security}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {258--275}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_18}, doi = {10.1007/978-3-540-46588-1\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Verheul00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WangHCTCC00, author = {Xiaoyun Wang and Lucas Chi Kwong Hui and Kam{-}Pui Chow and Wai Wan Tsang and C. F. Chong and H. W. Chan}, editor = {Hideki Imai and Yuliang Zheng}, title = {Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {167--177}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_12}, doi = {10.1007/978-3-540-46588-1\_12}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WangHCTCC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WenSM00, author = {Wu Wen and Takamichi Saito and Fumio Mizoguchi}, editor = {Hideki Imai and Yuliang Zheng}, title = {Security of Public Key Certificate Based Authentication Protocols}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {196--209}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_14}, doi = {10.1007/978-3-540-46588-1\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WenSM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YoungY00, author = {Adam L. Young and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {RSA-Based Auto-recoverable Cryptosystems}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {326--341}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_22}, doi = {10.1007/978-3-540-46588-1\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YoungY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhouDB00, author = {Jianying Zhou and Robert H. Deng and Feng Bao}, editor = {Hideki Imai and Yuliang Zheng}, title = {Some Remarks on a Fair Exchange Protocol}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {46--57}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_4}, doi = {10.1007/978-3-540-46588-1\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ZhouDB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2000, editor = {Hideki Imai and Yuliang Zheng}, title = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/b75033}, doi = {10.1007/B75033}, isbn = {3-540-66967-1}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.