Conferences in DBLP
Daniel Bleichenbacher Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:1-12 [Conf ] Ronald Cramer , Victor Shoup A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:13-25 [Conf ] Mihir Bellare , Anand Desai , David Pointcheval , Phillip Rogaway Relations Among Notions of Security for Public-Key Encryption Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:26-45 [Conf ] Steven M. Bellovin Cryptography and the Internet. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:46-55 [Conf ] Florent Chabaud , Antoine Joux Differential Collisions in SHA-0. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:56-71 [Conf ] Alex Biryukov , Eyal Kushilevitz From Differential Cryptoanalysis to Ciphertext-Only Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:72-88 [Conf ] Tal Rabin A Simplified Approach to Threshold and Proactive RSA. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:89-104 [Conf ] Dario Catalano , Rosario Gennaro New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:105-120 [Conf ] Matthias Fitzi , Martin Hirt , Ueli M. Maurer Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:121-136 [Conf ] William Aiello , Sachin Lodha , Rafail Ostrovsky Fast Digital Identity Revocation (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:137-152 [Conf ] Oded Goldreich , Birgit Pfitzmann , Ronald L. Rivest Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:153-168 [Conf ] Joe Kilian , Erez Petrank Identity Escrow. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:169-185 [Conf ] Charanjit S. Jutla Generalized Birthday Arracks on Unbalanced Feistel Networks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:186-199 [Conf ] Takeshi Shimoyama , Toshinobu Kaneko Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:200-211 [Conf ] Thomas Jakobson Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:212-222 [Conf ] Phong Q. Nguyen , Jacques Stern Cryptanalysis of the Ajtai-Dwork Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:223-242 [Conf ] Serge Vaudenay Cryptanalysis of the Chor-Rivest Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:243-256 [Conf ] Aviad Kipnis , Adi Shamir Cryptanalysis of the Oil & Vinegar Signature Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:257-266 [Conf ] Moni Naor , Omer Reingold From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:267-282 [Conf ] Mihir Bellare , Shai Halevi , Amit Sahai , Salil P. Vadhan Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:283-298 [Conf ] Yonatan Aumann , Michael O. Rabin Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:299-303 [Conf ] Sarvar Patel , Ganapathy S. Sundaram An Efficient Discrete Log Pseudo Random Generator. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:304-317 [Conf ] Tsuyoshi Takagi Fast RSA-Type Cryptosystem Modulo pk q. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:318-326 [Conf ] Neal Koblitz An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:327-337 [Conf ] Louis Salvail Quantum Bit Commitment from a Physical Assumption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:338-353 [Conf ] Kazuo Ohta , Tatsuaki Okamoto On Concrete Security Treatment of Signatures Derived from Identification. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:354-369 [Conf ] Chris Hall , David Wagner , John Kelsey , Bruce Schneier Building PRFs from PRPs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:370-389 [Conf ] William Aiello , Mihir Bellare , Giovanni Di Crescenzo , Ramarathnam Venkatesan Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:390-407 [Conf ] Satoshi Hada , Toshiaki Tanaka On the Existence of 3-Round Zero-Knowledge Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:408-423 [Conf ] Ronald Cramer , Ivan Damgård Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:424-441 [Conf ] Cynthia Dwork , Amit Sahai Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:442-457 [Conf ] Damian Weber , Thomas F. Denny The Solution of McCurley's Discrete Log Challenge. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:458-471 [Conf ] Daniel V. Bailey , Christof Paar Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:472-485 [Conf ] Ahto Buldas , Peeter Laud , Helger Lipmaa , Jan Willemson Time-Stamping with Binary Linking Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:486-501 [Conf ] Moni Naor , Benny Pinkas Threshold Traitor Tracing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:502-517 [Conf ]