


default search action
19th CRYPTO 1999: Santa Barbara, California, USA
- Michael J. Wiener:

Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings. Lecture Notes in Computer Science 1666, Springer 1999, ISBN 3-540-66347-9
Public-Key Cryptanalysis I
- Jean-Sébastien Coron, David Naccache, Julien P. Stern:

On the Security of RSA Padding. 1-18 - Aviad Kipnis, Adi Shamir:

Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. 19-30 - Phong Q. Nguyen, Jacques Stern:

The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. 31-46
Invited Lecture
- Ueli M. Maurer:

Information-Theoretic Cryptography. 47-64
Secure Communication and Computation
- Yonatan Aumann, Michael O. Rabin:

Information Theoretically Secure Communication in the Limited Storage Space Model. 65-79 - Amos Beimel, Tal Malkin, Silvio Micali:

The All-or-Nothing Nature of Two-Party Secure Computation. 80-97
Distributed Cryptography
- Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:

Adaptive Security for Threshold Cryptosystems. 98-115 - Niv Gilboa:

Two Party RSA Key Generation. 116-129 - Masayuki Abe:

Robust Distributed Multiplicaton with out Interaction. 130-147 - Berry Schoenmakers:

A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic. 148-164
Secret-Key Cryptography
- Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner:

Truncated Differentials and Skipjack. 165-180 - Thomas Johansson

, Fredrik Jönsson
:
Fast Correlation Attacks Based on Turbo Code Techniques. 181-197 - Subhamoy Maitra, Palash Sarkar:

Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality. 198-215
Message Authentication Codes
- John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz

, Phillip Rogaway:
UMAC: Fast and Secure Message Authentication. 216-233 - Mark Etzel, Sarvar Patel, Zulfikar Ramzan:

SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. 234-251 - Jee Hea An, Mihir Bellare:

Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. 252-269 - Mihir Bellare, Oded Goldreich, Hugo Krawczyk:

Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. 270-287
Public-Key Cryptanalysis II
- Phong Q. Nguyen:

Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97. 288-304 - Don Coppersmith:

Weakness in Quaternion Signatures. 305-314 - Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai:

Cryptanalysis of "2 R" Schemes. 315-325 - Dan Boneh, Glenn Durfee, Nick Howgrave-Graham:

Factoring N = prq for Large r. 326-337
Traitor Tracing
- Dan Boneh, Matthew K. Franklin:

An Efficient Public Key Traitor Tracing Scheme. 338-353 - Amos Fiat, Tamir Tassa:

Dynamic Traitor Training. 354-371 - Eli Gafni, Jessica Staddon, Yiqun Lisa Yin:

Efficient Methods for Integrating Traceability and Broadcast Encryption. 372-387
Differential Power Analysis
- Paul C. Kocher, Joshua Jaffe, Benjamin Jun:

Differential Power Analysis. 388-397 - Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi:

Towards Sound Approaches to Counteract Power-Analysis Attacks. 398-412
Signature Schemes
- Jan Camenisch, Markus Michels:

Separability and Efficiency for Generic Group Signature Schemes. 413-430 - Mihir Bellare, Sara K. Miner:

A Forward-Secure Digital Signature Scheme. 431-448 - Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie:

Abuse-Free Optimistic Contract Signing. 449-466
Zero Knowledge
- Oded Goldreich, Amit Sahai, Salil P. Vadhan:

Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK. 467-484 - Giovanni Di Crescenzo, Rafail Ostrovsky:

On Concurrent Zero-Knowledge with Pre-processing. 485-502
Asymmetric Encryption
- Victor Boyko:

On the Security Properties of OAEP as an All-or-Nothing Transform. 503-518 - Mihir Bellare, Amit Sahai:

Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. 519-536 - Eiichiro Fujisaki, Tatsuaki Okamoto:

Secure Integration of Asymmetric and Symmetric Encryption Schemes. 537-554
Electronic Cash
- Tomas Sander, Amnon Ta-Shma

:
Auditable, Anonymous Electronic Cash Extended Abstract. 555-572
Protocols and Broadcasting
- Moni Naor, Benny Pinkas:

Oblivious Transfer with Adaptive Queries. 573-590 - Niv Gilboa, Yuval Ishai:

Compressing Cryptographic Resources. 591-608 - Ravi Kumar, Sridhar Rajagopalan, Amit Sahai:

Coding Constructions for Blacklisting Problems without Computational Assumptions. 609-623 - Radha Poovendran

, John S. Baras:
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. 624-638

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














