Asiacrypt

Results: 43



#Item
11Microsoft Word - Asiacrypt 2002 Registration.doc

Microsoft Word - Asiacrypt 2002 Registration.doc

Add to Reading List

Source URL: conf.ncku.edu.tw

Language: English - Date: 2003-08-20 05:21:11
    12A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ‘07, Lecture Notes in Computer Science Vol. 4833, pp. 147–163, K. Kurosawa ed., Springer-Verlag, 2007. This is the full version. How

    A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ‘07, Lecture Notes in Computer Science Vol. 4833, pp. 147–163, K. Kurosawa ed., Springer-Verlag, 2007. This is the full version. How

    Add to Reading List

    Source URL: web.cecs.pdx.edu

    Language: English - Date: 2009-09-29 10:16:48
      13An extended abstract of this paper appears in Kaoru Kurosawa, editor, Advances in Cryptology – ASIACRYPT 2007, volume ???? of Lecture Notes in Computer Science, Springer-Verlag, 2007 [ANPS07a]. This is the full version

      An extended abstract of this paper appears in Kaoru Kurosawa, editor, Advances in Cryptology – ASIACRYPT 2007, volume ???? of Lecture Notes in Computer Science, Springer-Verlag, 2007 [ANPS07a]. This is the full version

      Add to Reading List

      Source URL: web.cecs.pdx.edu

      Language: English - Date: 2009-09-29 10:07:44
        14

        ASIACRYPT 2012 The 18th Annual International Conference on the Theory and Application of Cryptology and Information Security December 2 - 6, 2012, Beijing, China

        Add to Reading List

        Source URL: cis.sjtu.edu.cn

        Language: English - Date: 2012-06-01 04:39:17
          15ASIACRYPT 2012 The 18th Annual International Conference on the Theory and Application of Cryptology and Information Security December 2 - 6, 2012, Beijing, China  Call for Papers

          ASIACRYPT 2012 The 18th Annual International Conference on the Theory and Application of Cryptology and Information Security December 2 - 6, 2012, Beijing, China Call for Papers

          Add to Reading List

          Source URL: cis.sjtu.edu.cn

          Language: English - Date: 2012-06-01 04:39:17
            16Bivariate Polynomials Modulo Composites and Their Applications Dan Boneh and Henry Corrigan-Gibbs Stanford University  ASIACRYPT — 8 December 2014

            Bivariate Polynomials Modulo Composites and Their Applications Dan Boneh and Henry Corrigan-Gibbs Stanford University ASIACRYPT — 8 December 2014

            Add to Reading List

            Source URL: www.henrycg.com

            Language: English
              17Proof of Plaintext Knowledge for Code-Based Public-Key Encryption Revisited Rong Hu∗, Kirill Morozov† and Tsuyoshi Takagi‡ Abstract In a recent paper at Asiacrypt’2012, Jain et al point out that V´eron code-base

              Proof of Plaintext Knowledge for Code-Based Public-Key Encryption Revisited Rong Hu∗, Kirill Morozov† and Tsuyoshi Takagi‡ Abstract In a recent paper at Asiacrypt’2012, Jain et al point out that V´eron code-base

              Add to Reading List

              Source URL: imi.kyushu-u.ac.jp

              Language: English - Date: 2013-07-24 06:24:37
                18Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

                Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

                Add to Reading List

                Source URL: spar.isi.jhu.edu

                Language: English - Date: 2013-09-11 11:45:30
                19Solving low degree polynomials Asiacrypt 2003, Taipei, December 1, 2003 Don Coppersmith IBM T.J. Watson Research Center Yorktown Heights, New York, USA www.research.ibm.com/people/c/copper

                Solving low degree polynomials Asiacrypt 2003, Taipei, December 1, 2003 Don Coppersmith IBM T.J. Watson Research Center Yorktown Heights, New York, USA www.research.ibm.com/people/c/copper

                Add to Reading List

                Source URL: www.iacr.org

                - Date: 2004-04-21 17:27:27
                  20Asiacrypt$2012$  e:(G(×(G(⟶(G2( Pairings(and(Beyond( Dan$Boneh$

                  Asiacrypt$2012$ e:(G(×(G(⟶(G2( Pairings(and(Beyond( Dan$Boneh$

                  Add to Reading List

                  Source URL: www.iacr.org

                  Language: English - Date: 2012-12-14 06:25:26