Search dblp for Publications

export results for "toc:db/conf/pkc/pkc2000.bht:"

 download as .bib file

@inproceedings{DBLP:conf/pkc/Arita00,
  author       = {Seigo Arita},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Gaudry's Variant against C\({}_{\mbox{ab}}\) Curves},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {58--67},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_5},
  doi          = {10.1007/978-3-540-46588-1\_5},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Arita00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BanksLS00,
  author       = {William D. Banks and
                  Daniel Lieman and
                  Igor E. Shparlinski},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {An Identification Scheme Based on Sparse Polynomials},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {68--74},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_6},
  doi          = {10.1007/978-3-540-46588-1\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BanksLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BohannonJS00,
  author       = {Philip Bohannon and
                  Markus Jakobsson and
                  Sukamol Srikwan},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Cryptographic Approaches to Provacy in Forensic {DNA} Databases},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {373--390},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_25},
  doi          = {10.1007/978-3-540-46588-1\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BohannonJS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrickellPVY00,
  author       = {Ernest F. Brickell and
                  David Pointcheval and
                  Serge Vaudenay and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Design Validations for Discrete Logarithm Based Signature Schemes},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {276--292},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_19},
  doi          = {10.1007/978-3-540-46588-1\_19},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BrickellPVY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BuldasLS00,
  author       = {Ahto Buldas and
                  Helger Lipmaa and
                  Berry Schoenmakers},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Optimally Efficient Accountable Time-Stamping},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {293--305},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_20},
  doi          = {10.1007/978-3-540-46588-1\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BuldasLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BurmesterDDMOTY00,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Hiroshi Doi and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Mitsuru Tada and
                  Yuko Yoshifuji},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Structured ElGamal-Type Multisignature Scheme},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {466--483},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_31},
  doi          = {10.1007/978-3-540-46588-1\_31},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BurmesterDDMOTY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CramerDM00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Philip D. MacKenzie},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability
                  Assumptions},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {354--373},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_24},
  doi          = {10.1007/978-3-540-46588-1\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CramerDM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FrankelMY00,
  author       = {Yair Frankel and
                  Philip D. MacKenzie and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {"Psyeudorandom Intermixing": {A} Tool for Shared Cryptography},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {306--325},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_21},
  doi          = {10.1007/978-3-540-46588-1\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FrankelMY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GasskoGM00,
  author       = {Irene Gassko and
                  Peter Gemmell and
                  Philip D. MacKenzie},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Efficient and Fresh Cerification},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {342--353},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_23},
  doi          = {10.1007/978-3-540-46588-1\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GasskoGM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuhnleinM00,
  author       = {Detlef H{\"{u}}hnlein and
                  Johannes Merkle},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {An Efficient NICE-Schnorr-Type Signature Scheme},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {14--27},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_2},
  doi          = {10.1007/978-3-540-46588-1\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HuhnleinM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/InoueS00,
  author       = {Toro Inoue and
                  Kouichi Sakurai},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Making Hash Functions From Block Ciphers Secure and Efficient by Using
                  Convolutional Codes},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {391--404},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_26},
  doi          = {10.1007/978-3-540-46588-1\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/InoueS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IzuKY00,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Kazuhiro Yokoyama},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Efficient Implementation of Schoof's Algorithm in Case of Characteristic
                  2},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {210--222},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_15},
  doi          = {10.1007/978-3-540-46588-1\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IzuKY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KohlasM00,
  author       = {Reto Kohlas and
                  Ueli M. Maurer},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Confidence Valuation in a Public-Key Infrastructure Based on Uncertain
                  Evidence},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {93--112},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_8},
  doi          = {10.1007/978-3-540-46588-1\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KohlasM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LenstraV00,
  author       = {Arjen K. Lenstra and
                  Eric R. Verheul},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Selecting Cryptographic Key Sizes},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {446--465},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_30},
  doi          = {10.1007/978-3-540-46588-1\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LenstraV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LimH00,
  author       = {Chae Hoon Lim and
                  Hyo Sun Hwang},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Fast Implementation of Elliptic Curve Arithmetic in GF(p\({}^{\mbox{n}}\))},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {405--421},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_27},
  doi          = {10.1007/978-3-540-46588-1\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LimH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuOHC00,
  author       = {Chuchang Liu and
                  Maris A. Ozols and
                  Marie Henderson and
                  Anthony Cant},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A State-Based Model for Certificate Management Systems},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_7},
  doi          = {10.1007/978-3-540-46588-1\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuOHC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OkeyaS00,
  author       = {Katsuyuki Okeya and
                  Hiroyuki Kurumatani and
                  Kouichi Sakurai},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {238--257},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_17},
  doi          = {10.1007/978-3-540-46588-1\_17},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OkeyaS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ParkBD00,
  author       = {Juanma Gonz{\'{a}}lez Nieto and
                  DongGook Park and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Key Recovery in Third Generation Wireless Communication Systems},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_16},
  doi          = {10.1007/978-3-540-46588-1\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ParkBD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ParkBM00,
  author       = {DongGook Park and
                  Colin Boyd and
                  Sang{-}Jae Moon},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Forward Secrecy and Its Application to Future Mobile Communications
                  Security},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {433--445},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_29},
  doi          = {10.1007/978-3-540-46588-1\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ParkBM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PastuszakMS00,
  author       = {Jaroslaw Pastuszak and
                  Dariusz Michatek and
                  Josef Pieprzyk and
                  Jennifer Seberry},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Identification of Bad Signatures in Batches},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {28--45},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_3},
  doi          = {10.1007/978-3-540-46588-1\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/PastuszakMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Pointcheval00,
  author       = {David Pointcheval},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {The Composite Discrete Logarithm and Secure Authentication},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {113--128},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_9},
  doi          = {10.1007/978-3-540-46588-1\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Pointcheval00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Pointcheval00a,
  author       = {David Pointcheval},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Chosen-Ciphertext Security for Any One-Way Cryptosystem},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {129--146},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_10},
  doi          = {10.1007/978-3-540-46588-1\_10},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Pointcheval00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PoupardS00,
  author       = {Guillaume Poupard and
                  Jacques Stern},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Short Proofs of Knowledge for Factoring},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {147--166},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_11},
  doi          = {10.1007/978-3-540-46588-1\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PoupardS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Sako00,
  author       = {Kazue Sako},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {An Auction Protocol Which Hides Bids of Losers},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {422--432},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_28},
  doi          = {10.1007/978-3-540-46588-1\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Sako00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShinSR00,
  author       = {Sang{-}Uk Shin and
                  Weon Shin and
                  Kyung Hyune Rhee},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {All-or-Nothing Transform and Remotely Keyed Encription Protocols},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {178--195},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_13},
  doi          = {10.1007/978-3-540-46588-1\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShinSR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Tzeng00,
  author       = {Wen{-}Guey Tzeng},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_1},
  doi          = {10.1007/978-3-540-46588-1\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Tzeng00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Verheul00,
  author       = {Eric R. Verheul},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Certificates of Recoverability with Scale Recovery Agent Security},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {258--275},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_18},
  doi          = {10.1007/978-3-540-46588-1\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Verheul00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangHCTCC00,
  author       = {Xiaoyun Wang and
                  Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow and
                  Wai Wan Tsang and
                  C. F. Chong and
                  H. W. Chan},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Secure and Practical Tree-Structure Signature Schemes Based on Discrete
                  Logarithms},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {167--177},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_12},
  doi          = {10.1007/978-3-540-46588-1\_12},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WangHCTCC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WenSM00,
  author       = {Wu Wen and
                  Takamichi Saito and
                  Fumio Mizoguchi},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Security of Public Key Certificate Based Authentication Protocols},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {196--209},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_14},
  doi          = {10.1007/978-3-540-46588-1\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WenSM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YoungY00,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {RSA-Based Auto-recoverable Cryptosystems},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {326--341},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_22},
  doi          = {10.1007/978-3-540-46588-1\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YoungY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhouDB00,
  author       = {Jianying Zhou and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Some Remarks on a Fair Exchange Protocol},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {46--57},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_4},
  doi          = {10.1007/978-3-540-46588-1\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ZhouDB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2000,
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/b75033},
  doi          = {10.1007/B75033},
  isbn         = {3-540-66967-1},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics