![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
19th CRYPTO 1999: Santa Barbara, California, USA
- Michael J. Wiener:
Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings. Lecture Notes in Computer Science 1666, Springer 1999, ISBN 3-540-66347-9
Public-Key Cryptanalysis I
- Jean-Sébastien Coron, David Naccache, Julien P. Stern:
On the Security of RSA Padding. 1-18 - Aviad Kipnis, Adi Shamir:
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. 19-30 - Phong Q. Nguyen, Jacques Stern:
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. 31-46
Invited Lecture
- Ueli M. Maurer:
Information-Theoretic Cryptography. 47-64
Secure Communication and Computation
- Yonatan Aumann, Michael O. Rabin:
Information Theoretically Secure Communication in the Limited Storage Space Model. 65-79 - Amos Beimel, Tal Malkin, Silvio Micali:
The All-or-Nothing Nature of Two-Party Secure Computation. 80-97
Distributed Cryptography
- Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Adaptive Security for Threshold Cryptosystems. 98-115 - Niv Gilboa:
Two Party RSA Key Generation. 116-129 - Masayuki Abe:
Robust Distributed Multiplicaton with out Interaction. 130-147 - Berry Schoenmakers:
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic. 148-164
Secret-Key Cryptography
- Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner:
Truncated Differentials and Skipjack. 165-180 - Thomas Johansson
, Fredrik Jönsson
:
Fast Correlation Attacks Based on Turbo Code Techniques. 181-197 - Subhamoy Maitra, Palash Sarkar:
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality. 198-215
Message Authentication Codes
- John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz
, Phillip Rogaway:
UMAC: Fast and Secure Message Authentication. 216-233 - Mark Etzel, Sarvar Patel, Zulfikar Ramzan:
SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. 234-251 - Jee Hea An, Mihir Bellare:
Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. 252-269 - Mihir Bellare, Oded Goldreich, Hugo Krawczyk:
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. 270-287
Public-Key Cryptanalysis II
- Phong Q. Nguyen:
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97. 288-304 - Don Coppersmith:
Weakness in Quaternion Signatures. 305-314 - Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai:
Cryptanalysis of "2 R" Schemes. 315-325 - Dan Boneh, Glenn Durfee, Nick Howgrave-Graham:
Factoring N = prq for Large r. 326-337
Traitor Tracing
- Dan Boneh, Matthew K. Franklin:
An Efficient Public Key Traitor Tracing Scheme. 338-353 - Amos Fiat, Tamir Tassa:
Dynamic Traitor Training. 354-371 - Eli Gafni, Jessica Staddon, Yiqun Lisa Yin:
Efficient Methods for Integrating Traceability and Broadcast Encryption. 372-387
Differential Power Analysis
- Paul C. Kocher, Joshua Jaffe, Benjamin Jun:
Differential Power Analysis. 388-397 - Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi:
Towards Sound Approaches to Counteract Power-Analysis Attacks. 398-412
Signature Schemes
- Jan Camenisch, Markus Michels:
Separability and Efficiency for Generic Group Signature Schemes. 413-430 - Mihir Bellare, Sara K. Miner:
A Forward-Secure Digital Signature Scheme. 431-448 - Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie:
Abuse-Free Optimistic Contract Signing. 449-466
Zero Knowledge
- Oded Goldreich, Amit Sahai, Salil P. Vadhan:
Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK. 467-484 - Giovanni Di Crescenzo, Rafail Ostrovsky:
On Concurrent Zero-Knowledge with Pre-processing. 485-502
Asymmetric Encryption
- Victor Boyko:
On the Security Properties of OAEP as an All-or-Nothing Transform. 503-518 - Mihir Bellare, Amit Sahai:
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. 519-536 - Eiichiro Fujisaki, Tatsuaki Okamoto:
Secure Integration of Asymmetric and Symmetric Encryption Schemes. 537-554
Electronic Cash
- Tomas Sander, Amnon Ta-Shma
:
Auditable, Anonymous Electronic Cash Extended Abstract. 555-572
Protocols and Broadcasting
- Moni Naor, Benny Pinkas:
Oblivious Transfer with Adaptive Queries. 573-590 - Niv Gilboa, Yuval Ishai:
Compressing Cryptographic Resources. 591-608 - Ravi Kumar, Sridhar Rajagopalan, Amit Sahai:
Coding Constructions for Blacklisting Problems without Computational Assumptions. 609-623 - Radha Poovendran
, John S. Baras:
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. 624-638
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.