


default search action
18th CRYPTO 1998: Santa Barbara, California, USA
- Hugo Krawczyk:

Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings. Lecture Notes in Computer Science 1462, Springer 1998, ISBN 3-540-64892-5
Chosen-Ciphertext Security
- Daniel Bleichenbacher:

Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. 1-12 - Ronald Cramer, Victor Shoup:

A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. 13-25 - Mihir Bellare, Anand Desai, David Pointcheval

, Phillip Rogaway:
Relations Among Notions of Security for Public-Key Encryption Schemes. 26-45
Invited Lecture
- Steven M. Bellovin:

Cryptography and the Internet. 46-55
Cryptanalysis of Hash Functions and Block Ciphers
- Florent Chabaud, Antoine Joux:

Differential Collisions in SHA-0. 56-71 - Alex Biryukov

, Eyal Kushilevitz:
From Differential Cryptanalysis to Ciphertext-Only Attacks. 72-88
Distributed Cryptography
- Tal Rabin:

A Simplified Approach to Threshold and Proactive RSA. 89-104 - Dario Catalano, Rosario Gennaro:

New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. 105-120 - Matthias Fitzi, Martin Hirt, Ueli M. Maurer:

Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). 121-136
Identification and Certification
- William Aiello, Sachin Lodha, Rafail Ostrovsky

:
Fast Digital Identity Revocation (Extended Abstract). 137-152 - Oded Goldreich

, Birgit Pfitzmann, Ronald L. Rivest:
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. 153-168 - Joe Kilian, Erez Petrank:

Identity Escrow. 169-185
Block Cipher Design and Analysis
- Charanjit S. Jutla:

Generalized Birthday Arracks on Unbalanced Feistel Networks. 186-199 - Takeshi Shimoyama, Toshinobu Kaneko:

Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. 200-211 - Thomas Jakobson:

Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. 212-222
Algebraic Crytanalysis
- Phong Q. Nguyen, Jacques Stern:

Cryptanalysis of the Ajtai-Dwork Cryptosystem. 223-242 - Serge Vaudenay:

Cryptanalysis of the Chor-Rivest Cryptosystem. 243-256 - Aviad Kipnis, Adi Shamir:

Cryptanalysis of the Oil & Vinegar Signature Scheme. 257-266
Relations Among Cryptographic Primitives
- Moni Naor, Omer Reingold:

From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). 267-282 - Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan:

Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. 283-298
IACR Distinguished Lecture
- Yonatan Aumann, Michael O. Rabin:

Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract). 299-303
Alebraic Schemes
- Sarvar Patel, Ganapathy S. Sundaram:

An Efficient Discrete Log Pseudo Random Generator. 304-317 - Tsuyoshi Takagi:

Fast RSA-Type Cryptosystem Modulo pkq. 318-326 - Neal Koblitz:

An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. 327-337
Quantum Cryptography
- Louis Salvail:

Quantum Bit Commitment from a Physical Assumption. 338-353
Signatures, Random Functions and Ideal Ciphers
- Kazuo Ohta, Tatsuaki Okamoto:

On Concrete Security Treatment of Signatures Derived from Identification. 354-369 - Chris Hall, David A. Wagner, John Kelsey

, Bruce Schneier:
Building PRFs from PRPs. 370-389 - William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan:

Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. 390-407
Zero-Knowledge
- Satoshi Hada, Toshiaki Tanaka:

On the Existence of 3-Round Zero-Knowledge Protocols. 408-423 - Ronald Cramer, Ivan Damgård:

Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? 424-441 - Cynthia Dwork, Amit Sahai:

Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. 442-457
Implementation
- Damian Weber, Thomas F. Denny:

The Solution of McCurley's Discrete Log Challenge. 458-471 - Daniel V. Bailey, Christof Paar:

Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. 472-485
Rights Protection
- Ahto Buldas

, Peeter Laud
, Helger Lipmaa, Jan Willemson
:
Time-Stamping with Binary Linking Schemes. 486-501 - Moni Naor, Benny Pinkas:

Threshold Traitor Tracing. 502-517

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














