The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
1998 (conf/eurocrypt/98)

  1. Victor Shoup, Rosario Gennaro
    Securing Threshold Cryptosystems against Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:1-16 [Conf]
  2. Adam Young, Moti Yung
    Auto-Recoverable Auto-Certifiable Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:17-31 [Conf]
  3. Eiichiro Fujisaki, Tatsuaki Okamoto
    A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:32-46 [Conf]
  4. Noboru Kunihiro, Kenji Koyama
    Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:47-58 [Conf]
  5. Dan Boneh, Ramarathnam Venkatesan
    Breaking RSA May Not Be Equivalent to Factoring. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:59-71 [Conf]
  6. Ueli M. Maurer, Stefan Wolf
    Lower Bounds on Generic Algorithms in Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:72-84 [Conf]
  7. Alex Biryukov, Eyal Kushilevitz
    Improved Cryptanalysis of RC5. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:85-99 [Conf]
  8. Eli Biham, Lars R. Knudsen
    Cryptanalysis of the ANSI X9.52 CBCM Mode. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:100-111 [Conf]
  9. Philip Hawkes
    Differential-Linear Weak Key Classes of IDEA. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:112-126 [Conf]
  10. Matt Blaze, Gerrit Bleumer, Martin Strauss
    Divertible Protocols and Atomic Proxy Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:127-144 [Conf]
  11. Kaoru Kurosawa, Yvo Desmedt
    Optimum Traitor Tracing and Asymmetric Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:145-157 [Conf]
  12. Charanjit S. Jutla
    On Finding Small Solutions of Modular Multivariate Polynomial Equations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:158-170 [Conf]
  13. Damian Weber
    Computing Discrete Logarithms with Quadratic Number Rings. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:171-183 [Conf]
  14. Jacques Patarin, Louis Goubin, Nicolas Courtois
    Improved Algorithms for Isomorphisms of Polynomials. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:184-200 [Conf]
  15. Adi Shamir
    Visual Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:201-210 [Conf]
  16. Gérard D. Cohen, Antoine Lobstein, David Naccache, Gilles Zémor
    How to Improve an Exponentiation Black-Box. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:211-220 [Conf]
  17. Victor Boyko, Marcus Peinado, Ramarathnam Venkatesan
    Speeding up Discrete Log and Factoring Based Schemes via Precomputations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:221-235 [Conf]
  18. Mihir Bellare, Juan A. Garay, Tal Rabin
    Fast Batch Verification for Modular Exponentiation and Digital Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:236-250 [Conf]
  19. Matt Blaze, Joan Feigenbaum, Moni Naor
    A Formal Treatment of Remotely Keyed Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:251-265 [Conf]
  20. Mihir Bellare, Ted Krovetz, Phillip Rogaway
    Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:266-280 [Conf]
  21. Mariusz H. Jakubowski, Ramarathnam Venkatesan
    The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:281-293 [Conf]
  22. Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi
    A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:294-307 [Conf]
  23. Tatsuaki Okamoto, Shigenori Uchiyama
    A New Public-Key Cryptosystem as Secure as Factoring. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:308-318 [Conf]
  24. Alain P. Hiltgen
    Towards a Better Understanding of One-Wayness: Facing Linear Permutations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:319-333 [Conf]
  25. Daniel R. Simon
    Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:334-345 [Conf]
  26. Matthew K. Franklin, Rebecca N. Wright
    Secure Communications in Minimal Connectivity Models. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:346-360 [Conf]
  27. Christian Cachin
    On the Foundations of Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:361-374 [Conf]
  28. Donald Beaver, Avishai Wool
    Quorum-Based Secure Multi-party Computation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:375-390 [Conf]
  29. David Pointcheval
    Strengthened Security for Blind Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:391-405 [Conf]
  30. Markus Michels, Markus Stadler
    Generic Constructions for Secure and Efficient Confirmer Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:406-421 [Conf]
  31. Guillaume Poupard, Jacques Stern
    Security Analysis of a Practical "on the fly" Authentication and Signature Generation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:422-436 [Conf]
  32. Masayuki Abe
    Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:437-447 [Conf]
  33. Markus Jakobsson
    A Practical Mix. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:448-461 [Conf]
  34. Claude Carlet
    On the Propagation Criterion of Degree l and Order k. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:462-474 [Conf]
  35. Eric Filiol, Caroline Fontaine
    Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:475-488 [Conf]
  36. William Millan, Andrew Clark, Ed Dawson
    Heuristic Design of Cryptographically Strong Balanced Boolean Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:489-499 [Conf]
  37. Carles Padró, Germán Sáez
    Secret Sharing Schemes with Bipartite Access Structure. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:500-511 [Conf]
  38. Michael Luby, Jessica Staddon
    Combinatorial Bounds for Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:512-526 [Conf]
  39. Reihaneh Safavi-Naini, Huaxiong Wang
    New Results on Multi-Receiver Authentication Codes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:527-541 [Conf]
  40. Don Coppersmith
    Specialized Integer Factorization. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:542-545 [Conf]
  41. Tatsuaki Okamoto, Shigenori Uchiyama
    Security of an Identity-Based Cryptosystem and the Related Reductions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:546-560 [Conf]
  42. Agnes Hui Chan, Yair Frankel, Yiannis Tsiounis
    Easy Come - Easy Go Divisible Cash. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:561-575 [Conf]
  43. Moni Naor, Benny Pinkas
    Secure and Efficient Metering. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:576-590 [Conf]
  44. N. Asokan, Victor Shoup, Michael Waidner
    Optimistic Fair Exchange of Digital Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:591-606 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002