Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (Eds.):
Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings.
Lecture Notes in Computer Science 1716 Springer 1999, ISBN 3-540-66666-4 BibTeX
@proceedings{DBLP:conf/asiacrypt/1999,
editor = {Kwok-Yan Lam and
Eiji Okamoto and
Chaoping Xing},
title = {Advances in Cryptology - ASIACRYPT '99, International Conference
on the Theory and Applications of Cryptology and Information
Security, Singapore, November 14-18, 1999, Proceedings},
booktitle = {ASIACRYPT},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {1716},
year = {1999},
isbn = {3-540-66666-4},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Invited Talk
Asymmetric Key Cryptosystems
Analysis
Elliptic Curve Cryptosystems
- Yongfei Han, Peng-Chor Leong, Peng-Chong Tan, Jiang Zhang:
Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field.
75-85 BibTeX
- Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai:
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
86-102 BibTeX
- Iwan M. Duursma, Pierrick Gaudry, François Morain:
Speeding up the Discrete Log Computation on Curves with Automorphisms.
103-121 BibTeX
- Jean-Sébastien Coron, Helena Handschuh, David Naccache:
ECC: Do We Need to Count?
122-134 BibTeX
- Erik Woodward Knudsen:
Elliptic Scalar Multiplication Using Point Halving.
135-149 BibTeX
Public Key Cryptosystems
Integers and Computation
- Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Paul C. Leyland, Walter M. Lioen, Peter L. Montgomery, Brian Murphy, Herman te Riele, Paul Zimmermann:
Factorization of RSA-140 Using the Number Field Sieve.
195-207 BibTeX
- Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan:
How to Prove That a Committed Number Is Prime.
208-218 BibTeX
- Detlef Hühnlein, Tsuyoshi Takagi:
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
219-231 BibTeX
- Matthias Fitzi, Martin Hirt, Ueli M. Maurer:
General Adversaries in Unconditional Multi-party Computation.
232-246 BibTeX
Network Security
Random Number
Key Management
Authentication
Copyright © Sat May 16 22:58:36 2009
by Michael Ley (ley@uni-trier.de)