CRYPTO A*

38 papers

YearTitle / Authors
1997"Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case.
Mihir Bellare, Shafi Goldwasser, Daniele Micciancio
1997A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp.
Chae Hoon Lim, Pil Joong Lee
1997A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy.
Jean-François Misarsky
1997A One Way Function Based on Ideal Arithmetic in Number Fields.
Johannes Buchmann, Sachar Paulus
1997Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings
Burton S. Kaliski Jr.
1997An Improved Algorithm for Arithmetic on a Family of Elliptic Curves.
Jerome A. Solinas
1997Collision-Resistant Hashing: Towards Making UOWHFs Practical.
Mihir Bellare, Phillip Rogaway
1997Cryptanalysis of the Cellular Encryption Algorithm.
David A. Wagner, Bruce Schneier, John Kelsey
1997Deniable Encryption.
Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky
1997Differential Fault Analysis of Secret Key Cryptosystems.
Eli Biham, Adi Shamir
1997Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption).
Yuliang Zheng
1997Edit Distance Correlation Attack on the Alternating Step Generator.
Jovan Dj. Golic, Renato Menicocci
1997Efficient Algorithms for Elliptic Curve Cryptosystems.
Jorge Guajardo, Christof Paar
1997Efficient Anonymous Multicast and Reception (Extended Abstract).
Shlomi Dolev, Rafail Ostrovsky
1997Efficient Generation of Shared RSA Keys (Extended Abstract).
Dan Boneh, Matthew K. Franklin
1997Efficient Group Signature Schemes for Large Groups (Extended Abstract).
Jan Camenisch, Markus Stadler
1997Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem.
Oded Goldreich, Shafi Goldwasser, Shai Halevi
1997Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack.
Thomas A. Berson
1997Fast RSA-Type Cryptosystems Using N-Adic Expansion.
Tsuyoshi Takagi
1997Fast and Secure Hashing Based on Codes.
Lars R. Knudsen, Bart Preneel
1997How to Sign Digital Streams.
Rosario Gennaro, Pankaj Rohatgi
1997Keeping the SZK-Verifier Honest Unconditionally.
Giovanni Di Crescenzo, Tatsuaki Okamoto, Moti Yung
1997Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations.
Phong Q. Nguyen, Jacques Stern
1997On the Foundations of Modern Cryptography.
Oded Goldreich
1997On the Security of the KMOV Public Key Cryptosystem.
Daniel Bleichenbacher
1997Plug and Play Encryption.
Donald Beaver
1997Privacy Amplification Secure Against Active Adversaries.
Ueli M. Maurer, Stefan Wolf
1997Proactive RSA.
Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung
1997Public-Key Cryptosystems from Lattice Reduction Problems.
Oded Goldreich, Shafi Goldwasser, Shai Halevi
1997Quantum Information Processing: The Good, the Bad and the Ugly.
Gilles Brassard
1997RSA-Based Undeniable Signatures.
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
1997Security of Blind Digital Signatures (Extended Abstract).
Ari Juels, Michael Luby, Rafail Ostrovsky
1997Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations.
Eiichiro Fujisaki, Tatsuaki Okamoto
1997The Complexity of Computing Hard Core Predicates.
Mikael Goldmann, Mats Näslund
1997The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems.
Adam L. Young, Moti Yung
1997Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information.
Ran Canetti
1997Unconditional Security Against Memory-Bounded Adversaries.
Christian Cachin, Ueli M. Maurer
1997Visual Authentication and Identification.
Moni Naor, Benny Pinkas