CRYPTO A*

36 papers

YearTitle / Authors
1998A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack.
Ronald Cramer, Victor Shoup
1998A Simplified Approach to Threshold and Proactive RSA.
Tal Rabin
1998Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings
Hugo Krawczyk
1998An Efficient Discrete Log Pseudo Random Generator.
Sarvar Patel, Ganapathy S. Sundaram
1998An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm.
Neal Koblitz
1998Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract).
Yonatan Aumann, Michael O. Rabin
1998Building PRFs from PRPs.
Chris Hall, David A. Wagner, John Kelsey, Bruce Schneier
1998Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1.
Daniel Bleichenbacher
1998Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints.
Cynthia Dwork, Amit Sahai
1998Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree.
Thomas Jakobson
1998Cryptanalysis of the Ajtai-Dwork Cryptosystem.
Phong Q. Nguyen, Jacques Stern
1998Cryptanalysis of the Chor-Rivest Cryptosystem.
Serge Vaudenay
1998Cryptanalysis of the Oil & Vinegar Signature Scheme.
Aviad Kipnis, Adi Shamir
1998Cryptography and the Internet.
Steven M. Bellovin
1998Differential Collisions in SHA-0.
Florent Chabaud, Antoine Joux
1998Fast Digital Identity Revocation (Extended Abstract).
William Aiello, Sachin Lodha, Rafail Ostrovsky
1998Fast RSA-Type Cryptosystem Modulo p
Tsuyoshi Takagi
1998From Differential Cryptanalysis to Ciphertext-Only Attacks.
Alex Biryukov, Eyal Kushilevitz
1998From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract).
Moni Naor, Omer Reingold
1998Generalized Birthday Arracks on Unbalanced Feistel Networks.
Charanjit S. Jutla
1998Identity Escrow.
Joe Kilian, Erez Petrank
1998Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems.
Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan
1998New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications.
Dario Catalano, Rosario Gennaro
1998On Concrete Security Treatment of Signatures Derived from Identification.
Kazuo Ohta, Tatsuaki Okamoto
1998On the Existence of 3-Round Zero-Knowledge Protocols.
Satoshi Hada, Toshiaki Tanaka
1998Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms.
Daniel V. Bailey, Christof Paar
1998Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES.
Takeshi Shimoyama, Toshinobu Kaneko
1998Quantum Bit Commitment from a Physical Assumption.
Louis Salvail
1998Relations Among Notions of Security for Public-Key Encryption Schemes.
Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway
1998Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers.
William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan
1998Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop.
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
1998The Solution of McCurley's Discrete Log Challenge.
Damian Weber, Thomas F. Denny
1998Threshold Traitor Tracing.
Moni Naor, Benny Pinkas
1998Time-Stamping with Binary Linking Schemes.
Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Willemson
1998Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract).
Matthias Fitzi, Martin Hirt, Ueli M. Maurer
1998Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free?
Ronald Cramer, Ivan Damgård