The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1998 (conf/crypto/1998)

  1. Daniel Bleichenbacher
    Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:1-12 [Conf]
  2. Ronald Cramer, Victor Shoup
    A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:13-25 [Conf]
  3. Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway
    Relations Among Notions of Security for Public-Key Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:26-45 [Conf]
  4. Steven M. Bellovin
    Cryptography and the Internet. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:46-55 [Conf]
  5. Florent Chabaud, Antoine Joux
    Differential Collisions in SHA-0. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:56-71 [Conf]
  6. Alex Biryukov, Eyal Kushilevitz
    From Differential Cryptoanalysis to Ciphertext-Only Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:72-88 [Conf]
  7. Tal Rabin
    A Simplified Approach to Threshold and Proactive RSA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:89-104 [Conf]
  8. Dario Catalano, Rosario Gennaro
    New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:105-120 [Conf]
  9. Matthias Fitzi, Martin Hirt, Ueli M. Maurer
    Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:121-136 [Conf]
  10. William Aiello, Sachin Lodha, Rafail Ostrovsky
    Fast Digital Identity Revocation (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:137-152 [Conf]
  11. Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
    Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:153-168 [Conf]
  12. Joe Kilian, Erez Petrank
    Identity Escrow. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:169-185 [Conf]
  13. Charanjit S. Jutla
    Generalized Birthday Arracks on Unbalanced Feistel Networks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:186-199 [Conf]
  14. Takeshi Shimoyama, Toshinobu Kaneko
    Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:200-211 [Conf]
  15. Thomas Jakobson
    Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:212-222 [Conf]
  16. Phong Q. Nguyen, Jacques Stern
    Cryptanalysis of the Ajtai-Dwork Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:223-242 [Conf]
  17. Serge Vaudenay
    Cryptanalysis of the Chor-Rivest Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:243-256 [Conf]
  18. Aviad Kipnis, Adi Shamir
    Cryptanalysis of the Oil & Vinegar Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:257-266 [Conf]
  19. Moni Naor, Omer Reingold
    From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:267-282 [Conf]
  20. Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan
    Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:283-298 [Conf]
  21. Yonatan Aumann, Michael O. Rabin
    Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:299-303 [Conf]
  22. Sarvar Patel, Ganapathy S. Sundaram
    An Efficient Discrete Log Pseudo Random Generator. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:304-317 [Conf]
  23. Tsuyoshi Takagi
    Fast RSA-Type Cryptosystem Modulo pkq. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:318-326 [Conf]
  24. Neal Koblitz
    An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:327-337 [Conf]
  25. Louis Salvail
    Quantum Bit Commitment from a Physical Assumption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:338-353 [Conf]
  26. Kazuo Ohta, Tatsuaki Okamoto
    On Concrete Security Treatment of Signatures Derived from Identification. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:354-369 [Conf]
  27. Chris Hall, David Wagner, John Kelsey, Bruce Schneier
    Building PRFs from PRPs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:370-389 [Conf]
  28. William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan
    Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:390-407 [Conf]
  29. Satoshi Hada, Toshiaki Tanaka
    On the Existence of 3-Round Zero-Knowledge Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:408-423 [Conf]
  30. Ronald Cramer, Ivan Damgård
    Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:424-441 [Conf]
  31. Cynthia Dwork, Amit Sahai
    Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:442-457 [Conf]
  32. Damian Weber, Thomas F. Denny
    The Solution of McCurley's Discrete Log Challenge. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:458-471 [Conf]
  33. Daniel V. Bailey, Christof Paar
    Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:472-485 [Conf]
  34. Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Willemson
    Time-Stamping with Binary Linking Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:486-501 [Conf]
  35. Moni Naor, Benny Pinkas
    Threshold Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:502-517 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002