Conferences in DBLP
Victor Shoup , Rosario Gennaro Securing Threshold Cryptosystems against Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:1-16 [Conf ] Adam Young , Moti Yung Auto-Recoverable Auto-Certifiable Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:17-31 [Conf ] Eiichiro Fujisaki , Tatsuaki Okamoto A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:32-46 [Conf ] Noboru Kunihiro , Kenji Koyama Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:47-58 [Conf ] Dan Boneh , Ramarathnam Venkatesan Breaking RSA May Not Be Equivalent to Factoring. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:59-71 [Conf ] Ueli M. Maurer , Stefan Wolf Lower Bounds on Generic Algorithms in Groups. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:72-84 [Conf ] Alex Biryukov , Eyal Kushilevitz Improved Cryptanalysis of RC5. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:85-99 [Conf ] Eli Biham , Lars R. Knudsen Cryptanalysis of the ANSI X9.52 CBCM Mode. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:100-111 [Conf ] Philip Hawkes Differential-Linear Weak Key Classes of IDEA. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:112-126 [Conf ] Matt Blaze , Gerrit Bleumer , Martin Strauss Divertible Protocols and Atomic Proxy Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:127-144 [Conf ] Kaoru Kurosawa , Yvo Desmedt Optimum Traitor Tracing and Asymmetric Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:145-157 [Conf ] Charanjit S. Jutla On Finding Small Solutions of Modular Multivariate Polynomial Equations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:158-170 [Conf ] Damian Weber Computing Discrete Logarithms with Quadratic Number Rings. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:171-183 [Conf ] Jacques Patarin , Louis Goubin , Nicolas Courtois Improved Algorithms for Isomorphisms of Polynomials. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:184-200 [Conf ] Adi Shamir Visual Cryptanalysis. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:201-210 [Conf ] Gérard D. Cohen , Antoine Lobstein , David Naccache , Gilles Zémor How to Improve an Exponentiation Black-Box. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:211-220 [Conf ] Victor Boyko , Marcus Peinado , Ramarathnam Venkatesan Speeding up Discrete Log and Factoring Based Schemes via Precomputations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:221-235 [Conf ] Mihir Bellare , Juan A. Garay , Tal Rabin Fast Batch Verification for Modular Exponentiation and Digital Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:236-250 [Conf ] Matt Blaze , Joan Feigenbaum , Moni Naor A Formal Treatment of Remotely Keyed Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:251-265 [Conf ] Mihir Bellare , Ted Krovetz , Phillip Rogaway Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:266-280 [Conf ] Mariusz H. Jakubowski , Ramarathnam Venkatesan The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:281-293 [Conf ] Detlef Hühnlein , Michael J. Jacobson Jr. , Sachar Paulus , Tsuyoshi Takagi A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:294-307 [Conf ] Tatsuaki Okamoto , Shigenori Uchiyama A New Public-Key Cryptosystem as Secure as Factoring. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:308-318 [Conf ] Alain P. Hiltgen Towards a Better Understanding of One-Wayness: Facing Linear Permutations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:319-333 [Conf ] Daniel R. Simon Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:334-345 [Conf ] Matthew K. Franklin , Rebecca N. Wright Secure Communications in Minimal Connectivity Models. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:346-360 [Conf ] Christian Cachin On the Foundations of Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:361-374 [Conf ] Donald Beaver , Avishai Wool Quorum-Based Secure Multi-party Computation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:375-390 [Conf ] David Pointcheval Strengthened Security for Blind Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:391-405 [Conf ] Markus Michels , Markus Stadler Generic Constructions for Secure and Efficient Confirmer Signature Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:406-421 [Conf ] Guillaume Poupard , Jacques Stern Security Analysis of a Practical "on the fly" Authentication and Signature Generation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:422-436 [Conf ] Masayuki Abe Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:437-447 [Conf ] Markus Jakobsson A Practical Mix. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:448-461 [Conf ] Claude Carlet On the Propagation Criterion of Degree l and Order k. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:462-474 [Conf ] Eric Filiol , Caroline Fontaine Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:475-488 [Conf ] William Millan , Andrew Clark , Ed Dawson Heuristic Design of Cryptographically Strong Balanced Boolean Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:489-499 [Conf ] Carles Padró , Germán Sáez Secret Sharing Schemes with Bipartite Access Structure. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:500-511 [Conf ] Michael Luby , Jessica Staddon Combinatorial Bounds for Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:512-526 [Conf ] Reihaneh Safavi-Naini , Huaxiong Wang New Results on Multi-Receiver Authentication Codes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:527-541 [Conf ] Don Coppersmith Specialized Integer Factorization. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:542-545 [Conf ] Tatsuaki Okamoto , Shigenori Uchiyama Security of an Identity-Based Cryptosystem and the Related Reductions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:546-560 [Conf ] Agnes Hui Chan , Yair Frankel , Yiannis Tsiounis Easy Come - Easy Go Divisible Cash. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:561-575 [Conf ] Moni Naor , Benny Pinkas Secure and Efficient Metering. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:576-590 [Conf ] N. Asokan , Victor Shoup , Michael Waidner Optimistic Fair Exchange of Digital Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:591-606 [Conf ]