The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1999 (conf/crypto/1999)

  1. Jean-Sébastien Coron, David Naccache, Julien P. Stern
    On the Security of RSA Padding. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:1-18 [Conf]
  2. Aviad Kipnis, Adi Shamir
    Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:19-30 [Conf]
  3. Phong Q. Nguyen, Jacques Stern
    The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:31-46 [Conf]
  4. Ueli M. Maurer
    Information-Theoretic Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:47-64 [Conf]
  5. Yonatan Aumann, Michael O. Rabin
    Information Theoretically Secure Communication in the Limited Storage Space Model. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:65-79 [Conf]
  6. Amos Beimel, Tal Malkin, Silvio Micali
    The All-or-Nothing Nature of Two-Party Secure Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:80-97 [Conf]
  7. Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Adaptive Security for Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:98-115 [Conf]
  8. Niv Gilboa
    Two Party RSA Key Generation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:116-129 [Conf]
  9. Masayuki Abe
    Robust Distributed Multiplicaton with out Interaction. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:130-147 [Conf]
  10. Berry Schoenmakers
    A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:148-164 [Conf]
  11. Lars R. Knudsen, Matthew J. B. Robshaw, David Wagner
    Truncated Differentials and Skipjack. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:165-180 [Conf]
  12. Thomas Johansson, Fredrik Jönsson
    Fast Correlation Attacks Based on Turbo Code Techniques. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:181-197 [Conf]
  13. Subhamoy Maitra, Palash Sarkar
    Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:198-215 [Conf]
  14. John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway
    UMAC: Fast and Secure Message Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:216-233 [Conf]
  15. Mark Etzel, Sarvar Patel, Zulfikar Ramzan
    SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:234-251 [Conf]
  16. Jee Hea An, Mihir Bellare
    Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:252-269 [Conf]
  17. Mihir Bellare, Oded Goldreich, Hugo Krawczyk
    Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:270-287 [Conf]
  18. Phong Q. Nguyen
    Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:288-304 [Conf]
  19. Don Coppersmith
    Weakness in Quaternion Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:305-314 [Conf]
  20. Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai
    Cryptanalysis of ``2 R'' Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:315-325 [Conf]
  21. Dan Boneh, Glenn Durfee, Nick Howgrave-Graham
    Factoring N = prq for Large r. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:326-337 [Conf]
  22. Dan Boneh, Matthew K. Franklin
    An Efficient Public Key Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:338-353 [Conf]
  23. Amos Fiat, Tamir Tassa
    Dynamic Traitor Training. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:354-371 [Conf]
  24. Eli Gafni, Jessica Staddon, Yiqun Lisa Yin
    Efficient Methods for Integrating Traceability and Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:372-387 [Conf]
  25. Paul C. Kocher, Joshua Jaffe, Benjamin Jun
    Differential Power Analysis. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:388-397 [Conf]
  26. Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi
    Towards Sound Approaches to Counteract Power-Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:398-412 [Conf]
  27. Jan Camenisch, Markus Michels
    Separability and Efficiency for Generic Group Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:413-430 [Conf]
  28. Mihir Bellare, Sara K. Miner
    A Forward-Secure Digital Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:431-448 [Conf]
  29. Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie
    Abuse-Free Optimistic Contract Signing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:449-466 [Conf]
  30. Oded Goldreich, Amit Sahai, Salil P. Vadhan
    Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:467-484 [Conf]
  31. Giovanni Di Crescenzo, Rafail Ostrovsky
    On Concurrent Zero-Knowledge with Pre-processing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:485-502 [Conf]
  32. Victor Boyko
    On the Security Properties of OAEP as an All-or-Nothing Transform. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:503-518 [Conf]
  33. Mihir Bellare, Amit Sahai
    Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:519-536 [Conf]
  34. Eiichiro Fujisaki, Tatsuaki Okamoto
    Secure Integration of Asymmetric and Symmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:537-554 [Conf]
  35. Tomas Sander, Amnon Ta-Shma
    Auditable, Anonymous Electronic Cash Extended Abstract. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:555-572 [Conf]
  36. Moni Naor, Benny Pinkas
    Oblivious Transfer with Adaptive Queries. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:573-590 [Conf]
  37. Niv Gilboa, Yuval Ishai
    Compressing Cryptographic Resources. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:591-608 [Conf]
  38. Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
    Coding Constructions for Blacklisting Problems without Computational Assumptions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:609-623 [Conf]
  39. Radha Poovendran, John S. Baras
    An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:624-638 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002