Conferences in DBLP
Boaz Barak , Oded Goldreich , Russell Impagliazzo , Steven Rudich , Amit Sahai , Salil P. Vadhan , Ke Yang On the (Im)possibility of Obfuscating Programs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:1-18 [Conf ] Ran Canetti , Marc Fischlin Universally Composable Commitments. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:19-40 [Conf ] Dalit Naor , Moni Naor , Jeffery Lotspiech Revocation and Tracing Schemes for Stateless Receivers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:41-62 [Conf ] Aggelos Kiayias , Moti Yung Self Protecting Pirates and Black-Box Traitor Tracing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:63-79 [Conf ] Matthias Fitzi , Juan A. Garay , Ueli M. Maurer , Rafail Ostrovsky Minimal Complete Primitives for Secure Multi-party Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:80-100 [Conf ] Martin Hirt , Ueli M. Maurer Robustness for Free in Unconditional Multi-party Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:101-118 [Conf ] Ronald Cramer , Ivan Damgård Secure Distributed Linear Algebra in a Constant Number of Rounds. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:119-136 [Conf ] Philip D. MacKenzie , Michael K. Reiter Two-Party Generation of DSA Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:137-154 [Conf ] Yan Zong Ding Oblivious Transfer in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:155-170 [Conf ] Yehuda Lindell Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:171-189 [Conf ] Robert P. Gallant , Robert J. Lambert , Scott A. Vanstone Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:190-200 [Conf ] Dan Boneh , Igor Shparlinski On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:201-212 [Conf ] Dan Boneh , Matthew K. Franklin Identity-Based Encryption from the Weil Pairing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:213-229 [Conf ] James Manger A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:230-238 [Conf ] Victor Shoup OAEP Reconsidered. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:239-259 [Conf ] Eiichiro Fujisaki , Tatsuaki Okamoto , David Pointcheval , Jacques Stern RSA-OAEP Is Secure under the RSA Assumption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:260-274 [Conf ] Dan Boneh Simplified OAEP for the RSA and Rabin Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:275-291 [Conf ] Mihir Bellare , Alexandra Boldyreva , Lars R. Knudsen , Chanathip Namprempre Online Ciphers and the Hash-CBC Construction. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:292-309 [Conf ] Hugo Krawczyk The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:310-331 [Conf ] Gene Itkis , Leonid Reyzin Forward-Secure Signatures with Optimal Signing and Verifying. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:332-354 [Conf ] Adi Shamir , Yael Tauman Improved Online/Offline Signature Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:355-367 [Conf ] Jun Furukawa , Kazue Sako An Efficient Scheme for Proving a Shuffle. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:368-387 [Conf ] Jan Camenisch , Anna Lysyanskaya An Identity Escrow Scheme with Appointed Verifiers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:388-407 [Conf ] Oded Goldreich , Yehuda Lindell Session-Key Generation Using Human Passwords Only. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:408-432 [Conf ] Eric Brier , Christophe Clavier , Jean-Sébastien Coron , David Naccache Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:433-439 [Conf ] Jovan Dj. Golic Correlation Analysis of the Shrinking Generator. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:440-457 [Conf ] Jung Hee Cheon Nonlinear Vector Resilient Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:458-469 [Conf ] Seong-Hun Paeng , Kil-Chan Ha , Jae Heon Kim , Seongtaek Chee , Choonsik Park New Public Key Cryptosystem Using Finite Non Abelian Groups. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:470-485 [Conf ] Eonkyung Lee , Sangjin Lee , Sang Geun Hahn Pseudorandomness from Braid Groups. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:486-502 [Conf ] Ronald Cramer , Ivan Damgård , Serge Fehr On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:503-523 [Conf ] Christian Cachin , Klaus Kursawe , Frank Petzold , Victor Shoup Secure and Efficient Asynchronous Broadcast Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:524-541 [Conf ] Silvio Micali , Leonid Reyzin Soundness in the Public-Key Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:542-565 [Conf ] Alfredo De Santis , Giovanni Di Crescenzo , Rafail Ostrovsky , Giuseppe Persiano , Amit Sahai Robust Non-interactive Zero Knowledge. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:566-598 [Conf ]