CRYPTO A*

40 papers

YearTitle / Authors
1999A Forward-Secure Digital Signature Scheme.
Mihir Bellare, Sara K. Miner
1999A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic.
Berry Schoenmakers
1999Abuse-Free Optimistic Contract Signing.
Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie
1999Adaptive Security for Threshold Cryptosystems.
Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
1999Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings
Michael J. Wiener
1999An Efficient Public Key Traitor Tracing Scheme.
Dan Boneh, Matthew K. Franklin
1999An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.
Radha Poovendran, John S. Baras
1999Auditable, Anonymous Electronic Cash Extended Abstract.
Tomas Sander, Amnon Ta-Shma
1999Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK.
Oded Goldreich, Amit Sahai, Salil P. Vadhan
1999Coding Constructions for Blacklisting Problems without Computational Assumptions.
Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
1999Compressing Cryptographic Resources.
Niv Gilboa, Yuval Ishai
1999Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions.
Jee Hea An, Mihir Bellare
1999Cryptanalysis of "2 R" Schemes.
Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai
1999Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97.
Phong Q. Nguyen
1999Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization.
Aviad Kipnis, Adi Shamir
1999Differential Power Analysis.
Paul C. Kocher, Joshua Jaffe, Benjamin Jun
1999Dynamic Traitor Training.
Amos Fiat, Tamir Tassa
1999Efficient Methods for Integrating Traceability and Broadcast Encryption.
Eli Gafni, Jessica Staddon, Yiqun Lisa Yin
1999Factoring N = p
Dan Boneh, Glenn Durfee, Nick Howgrave-Graham
1999Fast Correlation Attacks Based on Turbo Code Techniques.
Thomas Johansson, Fredrik Jönsson
1999Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality.
Subhamoy Maitra, Palash Sarkar
1999Information Theoretically Secure Communication in the Limited Storage Space Model.
Yonatan Aumann, Michael O. Rabin
1999Information-Theoretic Cryptography.
Ueli M. Maurer
1999Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization.
Mihir Bellare, Amit Sahai
1999Oblivious Transfer with Adaptive Queries.
Moni Naor, Benny Pinkas
1999On Concurrent Zero-Knowledge with Pre-processing.
Giovanni Di Crescenzo, Rafail Ostrovsky
1999On the Security Properties of OAEP as an All-or-Nothing Transform.
Victor Boyko
1999On the Security of RSA Padding.
Jean-Sébastien Coron, David Naccache, Julien P. Stern
1999Robust Distributed Multiplicaton with out Interaction.
Masayuki Abe
1999SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions.
Mark Etzel, Sarvar Patel, Zulfikar Ramzan
1999Secure Integration of Asymmetric and Symmetric Encryption Schemes.
Eiichiro Fujisaki, Tatsuaki Okamoto
1999Separability and Efficiency for Generic Group Signature Schemes.
Jan Camenisch, Markus Michels
1999Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier.
Mihir Bellare, Oded Goldreich, Hugo Krawczyk
1999The All-or-Nothing Nature of Two-Party Secure Computation.
Amos Beimel, Tal Malkin, Silvio Micali
1999The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications.
Phong Q. Nguyen, Jacques Stern
1999Towards Sound Approaches to Counteract Power-Analysis Attacks.
Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi
1999Truncated Differentials and Skipjack.
Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner
1999Two Party RSA Key Generation.
Niv Gilboa
1999UMAC: Fast and Secure Message Authentication.
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway
1999Weakness in Quaternion Signatures.
Don Coppersmith