EUROCRYPT A*

33 papers

YearTitle / Authors
1999A Note on the Limits of Collusion-Resistant Watermarks.
Funda Ergün, Joe Kilian, Ravi Kumar
1999Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding
Jacques Stern
1999An Analysis of Exponentiation Based on Formal Languages.
Luke O'Connor
1999An Efficient
Ran Canetti, Shafi Goldwasser
1999Coin-Based Anonymous Fingerprinting.
Birgit Pfitzmann, Ahmad-Reza Sadeghi
1999Comparing the MOV and FR Reductions in Elliptic Curve Cryptography.
Ryuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai
1999Computationally Private Information Retrieval with Polylogarithmic Communication.
Christian Cachin, Silvio Micali, Markus Stadler
1999Conditional Oblivious Transfer and Timed-Release Encryption.
Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramakrishnan Rajagopalan
1999Cryptanalysis of RSA with Private Key
Dan Boneh, Glenn Durfee
1999Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
Eli Biham, Alex Biryukov, Adi Shamir
1999Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem.
Lars R. Knudsen, Willi Meier
1999Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key.
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
1999Distributed Pseudo-random Functions and KDCs.
Moni Naor, Benny Pinkas, Omer Reingold
1999Efficient Communication-Storage Tradeoffs for Multicast Encryption.
Ran Canetti, Tal Malkin, Kobbi Nissim
1999Efficient Multiparty Computations Secure Against an Adaptive Adversary.
Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin
1999Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic.
Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, Fumitaka Hoshino
1999Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes.
Thomas Johansson, Fredrik Jönsson
1999Lower Bounds for Oblivious Transfer Reductions.
Yevgeniy Dodis, Silvio Micali
1999New Public Key Cryptosystems Based on the Dependent-RSA Problems.
David Pointcheval
1999On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions.
Ivan Damgård, Joe Kilian, Louis Salvail
1999On the Concurrent Composition of Zero-Knowledge Proofs.
Ransom Richardson, Joe Kilian
1999On the Performance of Hyperelliptic Cryptosystems.
Nigel P. Smart
1999Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes.
Jan Camenisch, Markus Michels
1999Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications.
Marc Fischlin
1999Public-Key Cryptosystems Based on Composite Degree Residuosity Classes.
Pascal Paillier
1999Resistance Against General Iterated Attacks.
Serge Vaudenay
1999S-boxes with Controllable Nonlinearity.
Jung Hee Cheon, Seongtaek Chee, Choonsik Park
1999Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question.
Yongge Wang, Yvo Desmedt
1999Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
1999Secure Hash-and-Sign Signatures Without the Random Oracle.
Rosario Gennaro, Shai Halevi, Tal Rabin
1999Software Performance of Universal Hash Functions.
Wim Nevelsteen, Bart Preneel
1999Unbalanced Oil and Vinegar Signature Schemes.
Aviad Kipnis, Jacques Patarin, Louis Goubin
1999XOR and Non-XOR Differential Probabilities.
Philip Hawkes, Luke O'Connor