Asiacrypt

Results: 43



#Item
21MINUTES IACR BOARD MEETING CRYPTO’12 UCSB, 19 AUGUSTO PENING M ATTERS AtPreneel opens the meeting and he briefly goes around to confirm attendees and establish who is holding proxies. The agenda is appr

MINUTES IACR BOARD MEETING CRYPTO’12 UCSB, 19 AUGUSTO PENING M ATTERS AtPreneel opens the meeting and he briefly goes around to confirm attendees and establish who is holding proxies. The agenda is appr

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-08-16 17:22:10
22Microsoft PowerPoint - IACR_Membership_Meeting_EC2013_publicv1

Microsoft PowerPoint - IACR_Membership_Meeting_EC2013_publicv1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-08-16 17:55:40
23Curriculum Vitæ  Bimal Kumar Roy Director, Indian Statistical Institute  www.isical.ac.in/~bimal

Curriculum Vitæ Bimal Kumar Roy Director, Indian Statistical Institute www.isical.ac.in/~bimal

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2015-02-25 23:53:37
24Main text appears in T. Okamoto (Ed.): Advances in Cryptology – ASIACRYPT 2000, Springer-Verlag LNCS 1976, pp, ISBNAddendum does not appear in proceedings. Security of Cryptosystems Based on Cl

Main text appears in T. Okamoto (Ed.): Advances in Cryptology – ASIACRYPT 2000, Springer-Verlag LNCS 1976, pp, ISBNAddendum does not appear in proceedings. Security of Cryptosystems Based on Cl

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:48
25An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-02 11:56:16
26Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2013-09-11 11:45:30
27A version of this paper appears in Advances in Cryptology - ASIACRYPT 2008, LNCS Vol. 5350, pp. 326–343. J. Pieprzyk ed., Springer-Verlag, 2008. Twisted Edwards Curves Revisited Huseyin Hisil, Kenneth Koon-Ho Wong, Gar

A version of this paper appears in Advances in Cryptology - ASIACRYPT 2008, LNCS Vol. 5350, pp. 326–343. J. Pieprzyk ed., Springer-Verlag, 2008. Twisted Edwards Curves Revisited Huseyin Hisil, Kenneth Koon-Ho Wong, Gar

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-14 12:25:46
28Remarks on “Analysis of One Popular Group Signature Scheme” in Asiacrypt 2006 Giuseppe Ateniese1 , Jan Camenisch2 , Marc Joye3 , and Gene Tsudik4 1  4

Remarks on “Analysis of One Popular Group Signature Scheme” in Asiacrypt 2006 Giuseppe Ateniese1 , Jan Camenisch2 , Marc Joye3 , and Gene Tsudik4 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-15 14:28:48
29IACR Guidelines for Authors Sept 2014∗ Dear Author, The purpose of this document is to clarify aspects of submission to a publication of the IACR. These guidelines complement other guidelines available on the IACR webs

IACR Guidelines for Authors Sept 2014∗ Dear Author, The purpose of this document is to clarify aspects of submission to a publication of the IACR. These guidelines complement other guidelines available on the IACR webs

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-09-22 14:38:03
30Full version of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report[removed]Limitations on Transformations from Composite-

Full version of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report[removed]Limitations on Transformations from Composite-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-09-20 15:10:08