EUROCRYPT A*

45 papers

YearTitle / Authors
1998A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption.
Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi
1998A Formal Treatment of Remotely Keyed Encryption.
Matt Blaze, Joan Feigenbaum, Moni Naor
1998A New Public-Key Cryptosystem as Secure as Factoring.
Tatsuaki Okamoto, Shigenori Uchiyama
1998A Practical Mix.
Markus Jakobsson
1998A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications.
Eiichiro Fujisaki, Tatsuaki Okamoto
1998Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding
Kaisa Nyberg
1998Auto-Recoverable Auto-Certifiable Cryptosystems.
Adam L. Young, Moti Yung
1998Breaking RSA May Not Be Equivalent to Factoring.
Dan Boneh, Ramarathnam Venkatesan
1998Combinatorial Bounds for Broadcast Encryption.
Michael Luby, Jessica Staddon
1998Computing Discrete Logarithms with Quadratic Number Rings.
Damian Weber
1998Cryptanalysis of the ANSI X9.52 CBCM Mode.
Eli Biham, Lars R. Knudsen
1998Differential-Linear Weak Key Classes of IDEA.
Philip Hawkes
1998Divertible Protocols and Atomic Proxy Cryptography.
Matt Blaze, Gerrit Bleumer, Martin Strauss
1998Easy Come - Easy Go Divisible Cash.
Agnes Hui Chan, Yair Frankel, Yiannis Tsiounis
1998Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Z
Noboru Kunihiro, Kenji Koyama
1998Fast Batch Verification for Modular Exponentiation and Digital Signatures.
Mihir Bellare, Juan A. Garay, Tal Rabin
1998Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions?
Daniel R. Simon
1998Generic Constructions for Secure and Efficient Confirmer Signature Schemes.
Markus Michels, Markus Stadler
1998Heuristic Design of Cryptographically Strong Balanced Boolean Functions.
William Millan, Andrew J. Clark, Ed Dawson
1998Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity.
Eric Filiol, Caroline Fontaine
1998How to Improve an Exponentiation Black-Box.
Gérard D. Cohen, Antoine Lobstein, David Naccache, Gilles Zémor
1998Improved Algorithms for Isomorphisms of Polynomials.
Jacques Patarin, Louis Goubin, Nicolas T. Courtois
1998Improved Cryptanalysis of RC5.
Alex Biryukov, Eyal Kushilevitz
1998Lower Bounds on Generic Algorithms in Groups.
Ueli M. Maurer, Stefan Wolf
1998Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible.
Mihir Bellare, Ted Krovetz, Phillip Rogaway
1998New Results on Multi-Receiver Authentication Codes.
Reihaneh Safavi-Naini, Huaxiong Wang
1998On Finding Small Solutions of Modular Multivariate Polynomial Equations.
Charanjit S. Jutla
1998On the Foundations of Oblivious Transfer.
Christian Cachin
1998On the Propagation Criterion of Degree l and Order k.
Claude Carlet
1998Optimistic Fair Exchange of Digital Signatures (Extended Abstract).
N. Asokan, Victor Shoup, Michael Waidner
1998Optimum Traitor Tracing and Asymmetric Schemes.
Kaoru Kurosawa, Yvo Desmedt
1998Quorum-Based Secure Multi-party Computation.
Donald Beaver, Avishai Wool
1998Secret Sharing Schemes with Bipartite Access Structure.
Carles Padró, Germán Sáez
1998Secure Communications in Minimal Connectivity Models.
Matthew K. Franklin, Rebecca N. Wright
1998Secure and Efficient Metering.
Moni Naor, Benny Pinkas
1998Securing Threshold Cryptosystems against Chosen Ciphertext Attack.
Victor Shoup, Rosario Gennaro
1998Security Analysis of a Practical "on the fly" Authentication and Signature Generation.
Guillaume Poupard, Jacques Stern
1998Security of an Identity-Based Cryptosystem and the Related Reductions.
Tatsuaki Okamoto, Shigenori Uchiyama
1998Specialized Integer Factorization.
Don Coppersmith
1998Speeding up Discrete Log and Factoring Based Schemes via Precomputations.
Victor Boyko, Marcus Peinado, Ramarathnam Venkatesan
1998Strengthened Security for Blind Signatures.
David Pointcheval
1998The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers.
Mariusz H. Jakubowski, Ramarathnam Venkatesan
1998Towards a Better Understanding of One-Wayness: Facing Linear Permutations.
Alain P. Hiltgen
1998Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers.
Masayuki Abe
1998Visual Cryptanalysis.
Adi Shamir