What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from ASIACRYPT 1998
Year
Venue
Title
1998
ASIACRYPT
<i>C</i><sup>*</sup><sub>-+</sub> and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
Jacques Patarin
Louis Goubin
Nicolas Courtois
1998
ASIACRYPT
A Group Signature Scheme with Improved Efficiency
Jan Camenisch
Markus Michels
1998
ASIACRYPT
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol
Julien P. Stern
1998
ASIACRYPT
A Study on the Proposed Korean Digital Signature Algorithm
Chae Hoon Lim
Pil Joong Lee
1998
ASIACRYPT
Adaptively Secure Oblivious Transfer
Donald Beaver
1998
ASIACRYPT
Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings
1998
ASIACRYPT
An Attack on RSA Given a Small Fraction of the Private Key Bits
Dan Boneh
Glenn Durfee
Yair Frankel
1998
ASIACRYPT
Analysis Methods for (Alleged) RC4
Lars R. Knudsen
Willi Meier
Bart Preneel
Vincent Rijmen
Sven Verdoolaege
1998
ASIACRYPT
Audio and Optical Cryptography
Yvo Desmedt
Shuang Hou
Jean-Jacques Quisquater
1998
ASIACRYPT
Bounds and Constructions for Multireceiver Authentication Codes
Reihaneh Safavi-Naini
Huaxiong Wang
1998
ASIACRYPT
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings
Jinhui Chao
Osamu Nakamura
Kohji Sobataka
Shigeo Tsujii
1998
ASIACRYPT
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers
Hongjun Wu
Feng Bao
Robert H. Deng
Qin-Zhong Ye
1998
ASIACRYPT
Cryptanalysis of the Original McEliece Cryptosystem
Anne Canteaut
Nicolas Sendrier
1998
ASIACRYPT
Cryptoanalysis in Prime Order Subgroups of <i>Z</i><sup>*</sup><sub>n</sub>
Wenbo Mao
Chae Hoon Lim
1998
ASIACRYPT
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F<sub>2</sub>n
Yasuyuki Sakai
Kouichi Sakurai
1998
ASIACRYPT
ECC/DLP and Factoring-Based Cryptography: A Tale of Two Families
★
Invited paper
Burton S. Kaliski Jr.
1998
ASIACRYPT
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
Henri Cohen
Atsuko Miyaji
Takatoshi Ono
1998
ASIACRYPT
Efficient Fair Exchange with Verifiable Confirmation of Signatures
Liqun Chen
1998
ASIACRYPT
Efficient Implementation of Schoof's Algorithm
Tetsuya Izu
Jun Kogure
Masayuki Noro
Kazuhiro Yokoyama
1998
ASIACRYPT
Elliptic Curve Discrete Logarithms and the Index Calculus
Joseph H. Silverman
Joe Suzuki
1998
ASIACRYPT
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)
Mike Burmester
Yvo Desmedt
Jennifer Seberry
1998
ASIACRYPT
Fair Off-Line e-cash Made Easy
Yair Frankel
Yiannis Tsiounis
Moti Yung
1998
ASIACRYPT
Generating RSA Moduli with a Predetermined Portion
Arjen K. Lenstra
1998
ASIACRYPT
Generation of Shared RSA Keys by Two Parties
Guillaume Poupard
Jacques Stern
1998
ASIACRYPT
Improved Truncated Differential Attacks on SAFER
Hongjun Wu
Feng Bao
Robert H. Deng
Qin-Zhong Ye
1998
ASIACRYPT
Improving the Security of the McEliece Public-Key Cryptosystem
Hung-Min Sun
1998
ASIACRYPT
ML-Sequences over Rings <i>Z/(2<sup>e</sup>)</i><sup>*</sup>: I. Constructions of Nondegenerative ML-Sequences II. Injectiveness of Compression Mappings of New Classes
Wen Feng Qi
Jun-Hui Yang
Jing Jun Zhou
1998
ASIACRYPT
Off-Line Fair Payment Protocols Using Convertible Signatures
Colin Boyd
Ernest Foo
1998
ASIACRYPT
Optimal Resistance Against the Davies and Murphy Attack
Thomas Pornin
1998
ASIACRYPT
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators
Thomas Johansson
1998
ASIACRYPT
Some Bounds and a Construction for Secure Broadcast Encryption
Kaoru Kurosawa
Takuya Yoshida
Yvo Desmedt
Mike Burmester
1998
ASIACRYPT
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement
Stefan Wolf
1998
ASIACRYPT
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure
Phong Q. Nguyen
Jacques Stern
1998
ASIACRYPT
Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC
Zong-Duo Dai
Dingfeng Ye
Kwok-Yan Lam