What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from ASIACRYPT 1999
Year
Venue
Title
1999
ASIACRYPT
A Class of Explicit Perfect Multi-sequences
Chaoping Xing
Kwok-Yan Lam
Zhenghong Wei
1999
ASIACRYPT
A Quick Group Key Distribution Scheme with "Entity Revocation"
Jun Anzai
Natsume Matsuzaki
Tsutomu Matsumoto
1999
ASIACRYPT
A Signature Scheme with Message Recovery as Secure as Discrete Logarithm
Masayuki Abe
Tatsuaki Okamoto
1999
ASIACRYPT
A<sup>3</sup>-Codes under Collusion Attacks
Yejing Wang
Reihaneh Safavi-Naini
1999
ASIACRYPT
Adaptively-Secure Optimal-Resilience Proactive RSA
Yair Frankel
Philip D. MacKenzie
Moti Yung
1999
ASIACRYPT
Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings
1999
ASIACRYPT
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks
Goichiro Hanaoka
Tsuyoshi Nishioka
Yuliang Zheng
Hideki Imai
1999
ASIACRYPT
Approximation Hardness and Secure Communication in Broadcast Channels
Yvo Desmedt
Yongge Wang
1999
ASIACRYPT
Broadcast Authentication in Group Communication
Reihaneh Safavi-Naini
Huaxiong Wang
1999
ASIACRYPT
Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials
Haruki Seki
Toshinobu Kaneko
1999
ASIACRYPT
Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function
Sarbani Palit
Bimal K. Roy
1999
ASIACRYPT
Cryptanalysis of Two Cryptosystems Based on Group Actions
Simon R. Blackburn
Steven D. Galbraith
1999
ASIACRYPT
Doing More with Fewer Bits
Andries E. Brouwer
Ruud Pellikaan
Eric R. Verheul
1999
ASIACRYPT
ECC: Do We Need to Count?
Jean-Sébastien Coron
Helena Handschuh
David Naccache
1999
ASIACRYPT
Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries
Pascal Paillier
David Pointcheval
1999
ASIACRYPT
Elliptic Scalar Multiplication Using Point Halving
Erik Woodward Knudsen
1999
ASIACRYPT
Equivalent Keys of HPC
Carl D'Halluin
Gert Bijnens
Bart Preneel
Vincent Rijmen
1999
ASIACRYPT
Factorization of RSA-140 Using the Number Field Sieve
Stefania Cavallar
Bruce Dodson
Arjen K. Lenstra
Paul C. Leyland
Walter M. Lioen
Peter L. Montgomery
Brian Murphy
Herman te Riele
Paul Zimmermann
1999
ASIACRYPT
Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field
Yongfei Han
Peng-Chor Leong
Peng-Chong Tan
Jiang Zhang
1999
ASIACRYPT
General Adversaries in Unconditional Multi-party Computation
Matthias Fitzi
Martin Hirt
Ueli Maurer
1999
ASIACRYPT
How to Prove That a Committed Number Is Prime
Tri Van Le
Khanh Quoc Nguyen
Vijay Varadharajan
1999
ASIACRYPT
Linear Complexity versus Pseudorandomness: On Beth and Dai's Result
Yongge Wang
1999
ASIACRYPT
Mix-Networks on Permutation Networks
Masayuki Abe
1999
ASIACRYPT
Modulus Search for Elliptic Curve Cryptosystems
★
Invited paper
Kenji Koyama
Yukio Tsuruoka
Noboru Kunihiro
1999
ASIACRYPT
On Cryptographically Secure Vectorial Boolean Functions
Takashi Satoh
Tetsu Iwata
Kaoru Kurosawa
1999
ASIACRYPT
On the Design of RSA with Short Secret Exponent
Hung-Min Sun
Wu-Chuan Yang
Chi-Sung Laih
1999
ASIACRYPT
On the Lai-Massey Scheme
Serge Vaudenay
1999
ASIACRYPT
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves
Junji Shikata
Yuliang Zheng
Joe Suzuki
Hideki Imai
1999
ASIACRYPT
Periodical Multi-secret Threshold Cryptosystems
Masayuki Numao
1999
ASIACRYPT
Probabilistic Higher Order Differential Attack and Higher Order Bent Functions
Tetsu Iwata
Kaoru Kurosawa
1999
ASIACRYPT
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields
Detlef Hühnlein
Tsuyoshi Takagi
1999
ASIACRYPT
Secure Communication in an Unknown Network Using Certificates
Mike Burmester
Yvo Desmedt
1999
ASIACRYPT
Speeding up the Discrete Log Computation on Curves with Automorphisms
Iwan M. Duursma
Pierrick Gaudry
François Morain