Conferences in DBLP
Dan Boneh , Glenn Durfee Cryptanalysis of RSA with Private Key d Less than N 0.292 . [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:1-11 [Conf ] Eli Biham , Alex Biryukov , Adi Shamir Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:12-23 [Conf ] Wim Nevelsteen , Bart Preneel Software Performance of Universal Hash Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:24-41 [Conf ] Yevgeniy Dodis , Silvio Micali Lower Bounds for Oblivious Transfer Reductions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:42-55 [Conf ] Ivan Damgård , Joe Kilian , Louis Salvail On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:56-73 [Conf ] Giovanni Di Crescenzo , Rafail Ostrovsky , Sivaramakrishnan Rajagopalan Conditional Oblivious Transfer and Timed-Release Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:74-89 [Conf ] Ran Canetti , Shafi Goldwasser An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:90-106 [Conf ] Jan Camenisch , Markus Michels Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:107-122 [Conf ] Rosario Gennaro , Shai Halevi , Tal Rabin Secure Hash-and-Sign Signatures Without the Random Oracle. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:123-139 [Conf ] Funda Ergün , Joe Kilian , Ravi Kumar A Note on the Limits of Collusion-Resistant Watermarks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:140-149 [Conf ] Birgit Pfitzmann , Ahmad-Reza Sadeghi Coin-Based Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:150-164 [Conf ] Nigel P. Smart On the Performance of Hyperelliptic Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:165-175 [Conf ] Tetsutaro Kobayashi , Hikaru Morita , Kunio Kobayashi , Fumitaka Hoshino Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:176-189 [Conf ] Ryuichi Harasawa , Junji Shikata , Joe Suzuki , Hideki Imai Comparing the MOV and FR Reductions in Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:190-205 [Conf ] Aviad Kipnis , Jacques Patarin , Louis Goubin Unbalanced Oil and Vinegar Signature Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:206-222 [Conf ] Pascal Paillier Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:223-238 [Conf ] David Pointcheval New Public Key Cryptosystems Based on the Dependent-RSA Problems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:239-254 [Conf ] Serge Vaudenay Resistance Against General Iterated Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:255-271 [Conf ] Philip Hawkes , Luke O'Connor XOR and Non-XOR Differential Probabilities. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:272-285 [Conf ] Jung Hee Cheon , Seongtaek Chee , Choonsik Park S-boxes with Controllable Nonlinearity. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:286-294 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:295-310 [Conf ] Ronald Cramer , Ivan Damgård , Stefan Dziembowski , Martin Hirt , Tal Rabin Efficient Multiparty Computations Secure Against an Adaptive Adversary. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:311-326 [Conf ] Moni Naor , Benny Pinkas , Omer Reingold Distributed Pseudo-random Functions and KDCs. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:327-346 [Conf ] Thomas Johansson , Fredrik Jönsson Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:347-362 [Conf ] Lars R. Knudsen , Willi Meier Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:363-374 [Conf ] Luke O'Connor An Analysis of Exponentiation Based on Formal Languages. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:375-388 [Conf ] Takaaki Mizuki , Hiroki Shizuya , Takao Nishizeki Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:389-401 [Conf ] Christian Cachin , Silvio Micali , Markus Stadler Computationally Private Information Retrieval with Polylogarithmic Communication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:402-414 [Conf ] Ransom Richardson , Joe Kilian On the Concurrent Composition of Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:415-431 [Conf ] Marc Fischlin Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:432-445 [Conf ] Yongge Wang , Yvo Desmedt Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:446-458 [Conf ] Ran Canetti , Tal Malkin , Kobbi Nissim Efficient Communication-Storage Tradeoffs for Multicast Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:459-474 [Conf ]