|
Conferences in DBLP
- Arjen K. Lenstra, Eric R. Verheul
The XTR Public Key System. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:1-19 [Conf]
- Éliane Jaulmes, Antoine Joux
A Chosen-Ciphertext Attack against NTRU. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:20-35 [Conf]
- Yehuda Lindell, Benny Pinkas
Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:36-54 [Conf]
- Amos Beimel, Yuval Ishai, Tal Malkin
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:55-73 [Conf]
- Yevgeniy Dodis, Silvio Micali
Parallel Reducibility for Information-Theoretically Secure Computation. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:74-92 [Conf]
- Christian Cachin, Jan Camenisch
Optimistic Fair Secure Computation. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:93-111 [Conf]
- Yevgeniy Dodis, Shai Halevi, Tal Rabin
A Cryptographic Solution to a Game Theoretic Problem. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:112-130 [Conf]
- Ingrid Biehl, Bernd Meyer, Volker Müller
Differential Fault Attacks on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:131-146 [Conf]
- Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama
Quantum Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:147-165 [Conf]
- Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park
New Public-Key Cryptosystem Using Braid Groups. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:166-183 [Conf]
- Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:184-196 [Conf]
- John Black, Phillip Rogaway
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:197-215 [Conf]
- Michael Semanko
L-collision Attacks against Randomized MACs. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:216-228 [Conf]
- Jean-Sébastien Coron
On the Exact Security of Full Domain Hash. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:229-235 [Conf]
- Dan Boneh, Moni Naor
Timed Commitments. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:236-254 [Conf]
- Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:255-270 [Conf]
- Masayuki Abe, Tatsuaki Okamoto
Provably Secure Partially Blind Signatures. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:271-286 [Conf]
- Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth
Weaknesses in the SL2(IFs2) Hashing Scheme. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:287-299 [Conf]
- Thomas Johansson, Fredrik Jönsson
Fast Correlation Attacks through Reconstruction of Linear Polynomials. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:300-315 [Conf]
- Reihaneh Safavi-Naini, Yejing Wang
Sequential Traitor Tracing. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:316-332 [Conf]
- Juan A. Garay, Jessica Staddon, Avishai Wool
Long-Lived Broadcast Encryption. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:333-352 [Conf]
- Martín Abadi
Taming the Adversary. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:353-358 [Conf]
- Anand Desai
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:359-375 [Conf]
- Zulfikar Ramzan, Leonid Reyzin
On the Round Security of Symmetric-Key Cryptographic Primitives. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:376-393 [Conf]
- Anand Desai
New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:394-412 [Conf]
- Marc Fischlin, Roger Fischlin
Efficient Non-malleable Commitment Schemes. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:413-431 [Conf]
- Ivan Damgård, Jesper Buus Nielsen
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:432-450 [Conf]
- Alon Rosen
A Note on the Round-Complexity of Concurrent Zero-Knowledge. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:451-468 [Conf]
- Rosario Gennaro
An Improved Pseudo-random Generator Based on Discrete Log. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:469-481 [Conf]
- Nicolas Gisin, Stefan Wolf
Linking Classical and Quantum Key Agreement: Is There ``Bound Information''? [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:482-500 [Conf]
- Muxiang Zhang, Agnes Hui Chan
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:501-514 [Conf]
- Palash Sarkar, Subhamoy Maitra
Nonlinearity Bounds and Constructions of Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:515-532 [Conf]
- Jürgen Bierbrauer, Holger Schellwat
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:533-544 [Conf]
|