{"entities":{"Q1264336":{"pageid":1275086,"ns":120,"title":"Item:Q1264336","lastrevid":70032546,"modified":"2026-04-13T11:58:31Z","type":"item","id":"Q1264336","labels":{"en":{"language":"en","value":"Advances in cryptology - CRYPTO '98. 18th annual international cryptology conference, Santa Barbara, CA, USA, August 23--27, 1998. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1196055"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1264336$3A78DE9B-4D8F-48E2-B6F1-388D54113A84","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"d2ca18654f0a821b67560f5a0581f984f01ba693","datavalue":{"value":{"text":"Advances in cryptology - CRYPTO '98. 18th annual international cryptology conference, Santa Barbara, CA, USA, August 23--27, 1998. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1264336$58E5F956-9CFA-49B1-BAB9-221D47F3F6D0","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"4d35a52e5c440e166f5b9f81b560bd32a8bec8a5","datavalue":{"value":"0895.00067","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1264336$CBC5FAB8-9492-4FFA-B85D-FDC40DDA1E3E","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1264336$769EF9BD-3ACC-44D8-8ACD-B1FCA7306167","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"ae2521f9761ae57ba4ed6adb25308c9e0c8e1ecf","datavalue":{"value":{"time":"+1998-09-03T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1264336$820DF577-927D-49F8-A47D-A6AA295AA218","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"ed2666f1fd65266fc4740778cc2c470cf50f46f2","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference (17th, 1997) has been announced (see Zbl 0870.00047).  Indexed articles:  \\textit{Bleichenbacher, Daniel}, Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS\\#1, 1-12 [Zbl 0931.94017]  \\textit{Cramer, Ronald; Shoup, Victor}, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, 13-25 [Zbl 0931.94018]  \\textit{Bellare, Mihir; Desai, Anand; Pointcheval, David; Rogaway, Phillip}, Relations among notions of security for public-key encryption schemes, 26-45 [Zbl 0931.94014]  \\textit{Bellovin, Steven M.}, Cryptography and the internet, 46-55 [Zbl 0938.68035]  \\textit{Chabaud, Florent; Joux, Antoine}, Differential collisions in SHA-0, 56-71 [Zbl 0938.68036]  \\textit{Biryukov, Alex; Kushilevitz, Eyal}, From differential cryptanalysis to ciphertext-only attacks, 72-88 [Zbl 0931.94016]  \\textit{Rabin, Tal}, A simplified approach to threshold and proactive RSA, 89-104 [Zbl 0931.94037]  \\textit{Catalano, Dario; Gennaro, Rosario}, New efficient and secure protocols for verifiable signature sharing and other applications, 105-120 [Zbl 0931.94053]  \\textit{Fitzi, Matthias; Hirt, Martin; Maurer, Ueli}, Trading correctness for privacy in unconditional multi-party computation. (Extended abstract), 121-136 [Zbl 0938.68037]  \\textit{Aiello, William; Lodha, Sachin; Ostrovsky, Rafail}, Fast digital identity revocation. (Extended abstract), 137-152 [Zbl 0938.68038]  \\textit{Goldreich, Oded; Pfitzmann, Birgit; Rivest, Ronald L.}, Self-delegation with controlled propagation -- or -- what if you lose your laptop, 153-168 [Zbl 0946.68040]  \\textit{Kilian, Joe; Petrank, Erez}, Identity escrow, 169-185 [Zbl 0938.68039]  \\textit{Jutla, Charanjit S.}, Generalized birthday attacks on unbalanced Feistel networks, 186-199 [Zbl 0931.94028]  \\textit{Shimoyama, Takeshi; Kaneko, Toshinobu}, Quadratic relation of \\(S\\)-box and its application to the linear attack of full round DES, 200-211 [Zbl 0931.94038]  \\textit{Jakobsen, Thomas}, Cryptanalysis of block ciphers with probabilistic nonlinear relations of low degree, 212-222 [Zbl 0931.94025]  \\textit{Nguyen, Phong; Stern, Jacques}, Cryptanalysis of the Ajtai-Dwork cryptosystem, 223-242 [Zbl 0984.94508]  \\textit{Vaudenay, Serge}, Cryptanalysis of the Chor-Rivest cryptosystem, 243-256 [Zbl 0984.94513]  \\textit{Kipnis, Aviad; Shamir, Adi}, Cryptanalysis of the oil and vinegar signature scheme, 257-266 [Zbl 0931.94030]  \\textit{Naor, Moni; Reingold, Omer}, From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs. (Extended abstract), 267-282 [Zbl 0931.94047]  \\textit{Bellare, Mihir; Halevi, Shai; Sahai, Amit; Vadhan, Salil}, Many-to-one trapdoor functions and their relation to public-key cryptosystems, 283-298 [Zbl 0931.94015]  \\textit{Aumann, Yonatan; Rabin, Michael O.}, Authentication, enhanced security and error correcting codes. (Extended abstract), 299-303 [Zbl 0931.94050]  \\textit{Patel, Sarvar; Sundaram, Ganapathy S.}, An efficient discrete log pseudo random generator, 304-317 [Zbl 0964.94022]  \\textit{Takagi, Tsuiyoshi}, Fast RSA-type cryptosystem modulo \\(p^k q\\), 318-326 [Zbl 0931.94041]  \\textit{Koblitz, Neal}, An elliptic curve implementation of the finite field digital signature algorithm, 327-337 [Zbl 0971.94012]  \\textit{Salvail, Louis}, Quantum bit commitment from a physical assumption, 338-353 [Zbl 1036.94535]  \\textit{Ohta, Kazuo; Okamoto, Tatsuaki}, On concrete security treatment of signatures derived from identification, 354-369 [Zbl 0931.94035]  \\textit{Hall, Chris; Wagner, David; Kelsey, John; Schneider, Bruce}, Building PRFs from PRPs, 370-389 [Zbl 0931.94045]  \\textit{Aiello, W.; Bellare, M.; Di Crescenzo, G.; Venkatesan, R.}, Security amplification by composition: The case of doubly-iterated, ideal ciphers, 390-407 [Zbl 0931.94011]  \\textit{Hada, Satoshi; Tanaka, Toshiaki}, On the existence of 3-round zero-knowledge protocols, 408-423 [Zbl 0931.94009]  \\textit{Cramer, Ronald; Damg\u00e5rd, Ivan}, Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free?, 424-441 [Zbl 0964.94019]  \\textit{Dwork, Cynthia; Sahai, Amit}, Concurrent zero-knowledge: Reducing the need for timing constraints, 442-457 [Zbl 0931.94043]  \\textit{Weber, Damian; Denny, Thomas}, The solution of McCurley's discrete log challenge, 458-471 [Zbl 0945.11026]  \\textit{Bailey, Daniel V.; Paar, Christof}, Optimal extension fields for fast arithmetic in public-key algorithms, 472-485 [Zbl 0945.11025]  \\textit{Buldas, Ahto; Laud, Peeter; Lipmaa, Helger; Villemson, Jan}, Time-stamping with binary linking schemes, 486-501 [Zbl 0938.68040]  \\textit{Naor, Moni; Pinkas, Benny}, Threshold traitor tracing, 502-517 [Zbl 0938.68041]","type":"string"},"datatype":"string"},"type":"statement","id":"Q1264336$2925BA6B-FD39-49DF-AB01-6C17A75DF770","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1264336$6936A706-B7B3-43F4-BDDF-B6BA0E25850D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1264336$2F2FF452-B249-4D78-898C-E91F921EB9C7","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"700e00ed86d383b063c8b82ba3ee2080b7da476c","datavalue":{"value":"1196055","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1264336$37FED469-97F6-4421-BA71-A139C03EB3DF","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"72673ac97426519cbf4390be6951e1b2520429b9","datavalue":{"value":"Santa Barbara, CA (USA)","type":"string"},"datatype":"string"},"type":"statement","id":"Q1264336$782DDD9D-5275-4658-9F11-5F5D690A38E5","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q1264336$C99E5830-0DE8-41B3-81B3-05A3ADE703D3","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q1264336$CFA7F3CB-2C80-4573-9684-2776168DE8A6","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"0bec81e9febb8426545d0d0936818c86ba8b834d","datavalue":{"value":"CRYPTO '98","type":"string"},"datatype":"string"},"type":"statement","id":"Q1264336$3354C539-84E9-4782-A42F-AE0FBD463AEC","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9444c7e81fc487ab48d60d555be7e74462154789","datavalue":{"value":"Cryptology","type":"string"},"datatype":"string"},"type":"statement","id":"Q1264336$9BA85F7B-AFE4-48FF-969D-2ED7F02C0EA1","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1264336$814CB674-9B7F-4283-9565-7A8BAF8A2ED3","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Advances in cryptology - CRYPTO '98. 18th annual international cryptology conference, Santa Barbara, CA, USA, August 23--27, 1998. Proceedings","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Advances_in_cryptology_-_CRYPTO_%2798._18th_annual_international_cryptology_conference,_Santa_Barbara,_CA,_USA,_August_23--27,_1998._Proceedings"}}}}}