Conferences in DBLP
Jean-Sébastien Coron , David Naccache , Julien P. Stern On the Security of RSA Padding. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:1-18 [Conf ] Aviad Kipnis , Adi Shamir Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:19-30 [Conf ] Phong Q. Nguyen , Jacques Stern The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:31-46 [Conf ] Ueli M. Maurer Information-Theoretic Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:47-64 [Conf ] Yonatan Aumann , Michael O. Rabin Information Theoretically Secure Communication in the Limited Storage Space Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:65-79 [Conf ] Amos Beimel , Tal Malkin , Silvio Micali The All-or-Nothing Nature of Two-Party Secure Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:80-97 [Conf ] Ran Canetti , Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Adaptive Security for Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:98-115 [Conf ] Niv Gilboa Two Party RSA Key Generation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:116-129 [Conf ] Masayuki Abe Robust Distributed Multiplicaton with out Interaction. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:130-147 [Conf ] Berry Schoenmakers A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:148-164 [Conf ] Lars R. Knudsen , Matthew J. B. Robshaw , David Wagner Truncated Differentials and Skipjack. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:165-180 [Conf ] Thomas Johansson , Fredrik Jönsson Fast Correlation Attacks Based on Turbo Code Techniques. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:181-197 [Conf ] Subhamoy Maitra , Palash Sarkar Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:198-215 [Conf ] John Black , Shai Halevi , Hugo Krawczyk , Ted Krovetz , Phillip Rogaway UMAC: Fast and Secure Message Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:216-233 [Conf ] Mark Etzel , Sarvar Patel , Zulfikar Ramzan SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:234-251 [Conf ] Jee Hea An , Mihir Bellare Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:252-269 [Conf ] Mihir Bellare , Oded Goldreich , Hugo Krawczyk Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:270-287 [Conf ] Phong Q. Nguyen Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:288-304 [Conf ] Don Coppersmith Weakness in Quaternion Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:305-314 [Conf ] Dingfeng Ye , Kwok-Yan Lam , Zong-Duo Dai Cryptanalysis of ``2 R'' Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:315-325 [Conf ] Dan Boneh , Glenn Durfee , Nick Howgrave-Graham Factoring N = pr q for Large r. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:326-337 [Conf ] Dan Boneh , Matthew K. Franklin An Efficient Public Key Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:338-353 [Conf ] Amos Fiat , Tamir Tassa Dynamic Traitor Training. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:354-371 [Conf ] Eli Gafni , Jessica Staddon , Yiqun Lisa Yin Efficient Methods for Integrating Traceability and Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:372-387 [Conf ] Paul C. Kocher , Joshua Jaffe , Benjamin Jun Differential Power Analysis. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:388-397 [Conf ] Suresh Chari , Charanjit S. Jutla , Josyula R. Rao , Pankaj Rohatgi Towards Sound Approaches to Counteract Power-Analysis Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:398-412 [Conf ] Jan Camenisch , Markus Michels Separability and Efficiency for Generic Group Signature Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:413-430 [Conf ] Mihir Bellare , Sara K. Miner A Forward-Secure Digital Signature Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:431-448 [Conf ] Juan A. Garay , Markus Jakobsson , Philip D. MacKenzie Abuse-Free Optimistic Contract Signing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:449-466 [Conf ] Oded Goldreich , Amit Sahai , Salil P. Vadhan Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:467-484 [Conf ] Giovanni Di Crescenzo , Rafail Ostrovsky On Concurrent Zero-Knowledge with Pre-processing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:485-502 [Conf ] Victor Boyko On the Security Properties of OAEP as an All-or-Nothing Transform. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:503-518 [Conf ] Mihir Bellare , Amit Sahai Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:519-536 [Conf ] Eiichiro Fujisaki , Tatsuaki Okamoto Secure Integration of Asymmetric and Symmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:537-554 [Conf ] Tomas Sander , Amnon Ta-Shma Auditable, Anonymous Electronic Cash Extended Abstract. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:555-572 [Conf ] Moni Naor , Benny Pinkas Oblivious Transfer with Adaptive Queries. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:573-590 [Conf ] Niv Gilboa , Yuval Ishai Compressing Cryptographic Resources. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:591-608 [Conf ] Ravi Kumar , Sridhar Rajagopalan , Amit Sahai Coding Constructions for Blacklisting Problems without Computational Assumptions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:609-623 [Conf ] Radha Poovendran , John S. Baras An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:624-638 [Conf ]