The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1997 (conf/crypto/1997)

  1. Mikael Goldmann, Mats Näslund
    The Complexity of Computing Hard Core Predicates. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:1-15 [Conf]
  2. Eiichiro Fujisaki, Tatsuaki Okamoto
    Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:16-30 [Conf]
  3. Giovanni Di Crescenzo, Tatsuaki Okamoto, Moti Yung
    Keeping the SZK-Verifier Honest Unconditionally. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:31-45 [Conf]
  4. Oded Goldreich
    On the Foundations of Modern Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:46-74 [Conf]
  5. Donald Beaver
    Plug and Play Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:75-89 [Conf]
  6. Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky
    Deniable Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:90-104 [Conf]
  7. Oded Goldreich, Shafi Goldwasser, Shai Halevi
    Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:105-111 [Conf]
  8. Oded Goldreich, Shafi Goldwasser, Shai Halevi
    Public-Key Cryptosystems from Lattice Reduction Problems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:112-131 [Conf]
  9. Rosario Gennaro, Hugo Krawczyk, Tal Rabin
    RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:132-149 [Conf]
  10. Ari Juels, Michael Luby, Rafail Ostrovsky
    Security of Blind Digital Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:150-164 [Conf]
  11. Yuliang Zheng
    Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:165-179 [Conf]
  12. Rosario Gennaro, Pankaj Rohatgi
    How to Sign Digital Streams. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:180-197 [Conf]
  13. Phong Q. Nguyen, Jacques Stern
    Merkle-Hellman Revisited: A Cryptoanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:198-212 [Conf]
  14. Thomas A. Berson
    Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:213-220 [Conf]
  15. Jean-François Misarsky
    A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:221-234 [Conf]
  16. Daniel Bleichenbacher
    On the Security of the KMOV Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:235-248 [Conf]
  17. Chae Hoon Lim, Pil Joong Lee
    A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:249-263 [Conf]
  18. Adam Young, Moti Yung
    The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:264-276 [Conf]
  19. Mihir Bellare, Shafi Goldwasser, Daniele Micciancio
    "Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:277-291 [Conf]
  20. Christian Cachin, Ueli M. Maurer
    Unconditional Security Against Memory-Bounded Adversaries. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:292-306 [Conf]
  21. Ueli M. Maurer, Stefan Wolf
    Privacy Amplification Secure Against Active Adversaries. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:307-321 [Conf]
  22. Moni Naor, Benny Pinkas
    Visual Authentication and Identification. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:322-336 [Conf]
  23. Gilles Brassard
    Quantum Information Processing: The Good, the Bad and the Ugly. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:337-341 [Conf]
  24. Jorge Guajardo, Christof Paar
    Efficient Algorithms for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:342-356 [Conf]
  25. Jerome A. Solinas
    An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:357-371 [Conf]
  26. Tsuyoshi Takagi
    Fast RSA-Type Cryptosystems Using N-Adic Expansion. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:372-384 [Conf]
  27. Johannes Buchmann, Sachar Paulus
    A One Way Function Based on Ideal Arithmetic in Number Fields. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:385-394 [Conf]
  28. Shlomi Dolev, Rafail Ostrovsky
    Efficient Anonymous Multicast and Reception (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:395-409 [Conf]
  29. Jan Camenisch, Markus Stadler
    Efficient Group Signature Schemes for Large Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:410-424 [Conf]
  30. Dan Boneh, Matthew K. Franklin
    Efficient Generation of Shared RSA Keys (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:425-439 [Conf]
  31. Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung
    Proactive RSA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:440-454 [Conf]
  32. Ran Canetti
    Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:455-469 [Conf]
  33. Mihir Bellare, Phillip Rogaway
    Collision-Resistant Hashing: Towards Making UOWHFs Practical. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:470-484 [Conf]
  34. Lars R. Knudsen, Bart Preneel
    Fast and Secure Hashing Based on Codes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:485-498 [Conf]
  35. Jovan Dj. Golic, Renato Menicocci
    Edit Distance Correlation Attack on the Alternating Step Generator. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:499-512 [Conf]
  36. Eli Biham, Adi Shamir
    Differential Fault Analysis of Secret Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:513-525 [Conf]
  37. David Wagner, Bruce Schneier, John Kelsey
    Cryptoanalysis of the Cellular Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:526-537 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002