Conferences in DBLP
Mihir Bellare Practice-Oriented Provable Security. [Citation Graph (0, 0)][DBLP ] Lectures on Data Security, 1998, pp:1-15 [Conf ] Ronald Cramer Introduction to Secure Computation. [Citation Graph (0, 0)][DBLP ] Lectures on Data Security, 1998, pp:16-62 [Conf ] Ivan Damgård Commitment Schemes and Zero-Knowledge Protocols. [Citation Graph (0, 0)][DBLP ] Lectures on Data Security, 1998, pp:63-86 [Conf ] Burton S. Kaliski Jr. Emerging Standards for Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] Lectures on Data Security, 1998, pp:87-104 [Conf ] Lars R. Knudsen Contemporary Block Ciphers. [Citation Graph (0, 0)][DBLP ] Lectures on Data Security, 1998, pp:105-126 [Conf ] Peter Landrock Primality Tests and Use of Primes in Public-Key Systems. [Citation Graph (0, 0)][DBLP ] Lectures on Data Security, 1998, pp:127-133 [Conf ] Torben P. Pedersen Signing Contracts and Paying Electronically. [Citation Graph (0, 0)][DBLP ] Lectures on Data Security, 1998, pp:134-157 [Conf ] Bart Preneel The State of Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP ] Lectures on Data Security, 1998, pp:158-182 [Conf ] Louis Salvail The Search for the Holy Grail in Quantum Cryptography. [Citation Graph (0, 0)][DBLP ] Lectures on Data Security, 1998, pp:183-216 [Conf ] Stefan Wolf Unconditional Security in Cryptography. [Citation Graph (0, 0)][DBLP ] Lectures on Data Security, 1998, pp:217-250 [Conf ]