{"entities":{"Q1284397":{"pageid":1295147,"ns":120,"title":"Item:Q1284397","lastrevid":67100064,"modified":"2026-04-12T15:16:02Z","type":"item","id":"Q1284397","labels":{"en":{"language":"en","value":"Advances in cryptology - EUROCRYPT '99. 17th annual Eurocrypt conference, international conference on The theory and application of cryptographic techniques, Prague, Czech Republic, May 2--6, 1999. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1278606"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1284397$3679446E-E14B-476A-B3AC-54DB02EA941B","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"2baa362642e3a5433561de81373be7c5214f5bb7","datavalue":{"value":{"text":"Advances in cryptology - EUROCRYPT '99. 17th annual Eurocrypt conference, international conference on The theory and application of cryptographic techniques, Prague, Czech Republic, May 2--6, 1999. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1284397$082860B1-003B-43AE-9624-D1A548084425","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"a4c6abee97ebedea7ebd080fd9a3d220ff1ce73e","datavalue":{"value":"0912.00038","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1284397$90E3E87E-6A44-4E02-B7F5-543A9D9B1988","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1284397$7D862FCA-D320-4B7E-8DEC-73C7D4E6ECB8","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"aa2e5e35d3f24c6f7bef23b8c15234f371e216b0","datavalue":{"value":{"time":"+1999-04-26T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1284397$A801CE36-88F5-495C-86EF-6E214D3AEB0A","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"2ec1db7584419dca7de8fbb55f60eb39e8bfd82f","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference (1997) has been announced (see Zbl 0864.00083).  Indexed articles:  \\textit{Boneh, Dan; Durfee, Glenn}, Cryptanalysis of RSA with private key \\(d\\) less than \\(N^{0. 292}\\), 1-11 [Zbl 0948.94009]  \\textit{Biham, Eli; Biryukov, Alex; Shamir, Adi}, Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials, 12-23 [Zbl 0927.94013]  \\textit{Nevelsteen, Wim; Preneel, Bart}, Software performance of universal hash functions, 24-41 [Zbl 0932.68043]  \\textit{Dodis, Yevgeniy; Micali, Silvio}, Lower bounds for oblivious transfer reductions, 42-55 [Zbl 0932.68044]  \\textit{Damg\u00e5rd, Ivan; Kilian, Joe; Salvail, Louis}, On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions, 56-73 [Zbl 0932.68045]  \\textit{Di Crescenzo, Giovanni; Ostrovsky, Rafail; Rajagopalan, Sivaramakrishnan}, Conditional oblivous transfer and timed-release encryption, 74-89 [Zbl 0933.94024]  \\textit{Canetti, Ran; Goldwasser, Shafi}, An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack, 90-106 [Zbl 0948.94008]  \\textit{Camenisch, Jan; Michels, Markus}, Proving in zero-knowledge that a number is the product of two safe primes, 107-122 [Zbl 0971.94009]  \\textit{Gennaro, Rosario; Halevi, Shai; Rabin, Tal}, Secure hash-and-sign signatures without the random oracle, 123-139 [Zbl 1038.94533]  \\textit{Ergun, Funda; Kilian, Joe; Kumar, Ravi}, A note on the limits of collusion-resistant watermarks, 140-149 [Zbl 0931.94020]  \\textit{Pfitzmann, Birgit; Sadeghi, Ahmad-Reza}, Coin-based anonymous fingerprinting, 150-164 [Zbl 0933.94032]  \\textit{Smart, Nigel P.}, On the performance of hyperelliptic cryptosystems, 165-175 [Zbl 0938.94010]  \\textit{Kobayashi, Tetsutaro; Morita, Hikaru; Kobayashi, Kunio; Hoshino, Fumitaka}, Fast elliptic curve algorithm combining Frobenius map and table reference to adapt to higher characteristic, 176-189 [Zbl 0958.94020]  \\textit{Harasawa, Ryuichi; Shikata, Junji; Suzuki, Joe; Imai, Hideki}, Comparing the MOV and FR reductions in elliptic curve cryptography, 190-205 [Zbl 0938.94009]  \\textit{Kipnis, Aviad; Patarin, Jacques; Goubin, Louis}, Unbalanced oil and vinegar signature schemes, 206-222 [Zbl 0933.94031]  \\textit{Paillier, Pascal}, Public-key cryptosystems based on composite degree residuosity classes, 223-238 [Zbl 0933.94027]  \\textit{Pointcheval, David}, New public key cryptosystems based on the dependent-RSA problems, 239-254 [Zbl 0933.94028]  \\textit{Vaudenay, Serge}, Resistance against general iterated attacks, 255-271 [Zbl 0931.94042]  \\textit{Hawkes, Philip; O'Connor, Luke}, XOR and non-XOR differential probabilities, 272-285 [Zbl 0931.94024]  \\textit{Cheon, Jung Hee; Chee, Seongtaek; Park, Choonsik}, \\(S\\)-boxes with controllable nonlinearity, 286-294 [Zbl 1038.94524]  \\textit{Gennaro, Rosario; Jarecki, Stanis\u0142aw; Krawczyk, Hugo; Rabin, Tal}, Secure distributed key generation for discrete-log based cryptosystems, 295-310 [Zbl 0931.94021]  \\textit{Cramer, Ronald; Damg\u00e5rd, Ivan; Dziembowski, Stefan; Hirt, Martin; Rabin, Tal}, Efficient multiparty computations secure against an adaptive adversary, 311-326 [Zbl 0931.94019]  \\textit{Naor, Moni; Pinkas, Benny; Reingold, Omer}, Distributed pseudo-random functions and KDCs, 327-346 [Zbl 0931.94046]  \\textit{Johansson, Thomas; J\u00f6nsson, Fredrik}, Improved fast correlation attacks on stream ciphers via convolutional codes, 347-362 [Zbl 0931.94027]  \\textit{Knudsen, Lars R.; Meier, Willi}, Cryptanalysis of an identification scheme based on the permuted perceptron problem, 363-374 [Zbl 0933.94025]  \\textit{O'Connor, Luke}, An analysis of exponentiation based on formal languages, 375-388 [Zbl 0933.94030]  \\textit{Mizuki, Takaaki; Shizuya, Hiroki; Nishizeki, Takao}, Dealing necessary and sufficient numbers of cards for sharing a one-bit secret key (extended abstract), 389-401 [Zbl 0931.94034]  \\textit{Cachin, Christian; Micali, Silvio; Stadler, Markus}, Computationally private information retrieval with polylogarithmic communication, 402-414 [Zbl 0932.68042]  \\textit{Richardson, Ransom; Kilian, Joe}, On the concurrent composition of zero-knowledge proofs, 415-431 [Zbl 0932.68046]  \\textit{Fischlin, Marc}, Pseudorandom function tribe ensembles based on one-way permutations: Improvements and applications, 432-445 [Zbl 0931.94044]  \\textit{Wang, Yongge; Desmedt, Yvo}, Secure communication in broadcast channels: The answer to Franklin and Wright's question, 446-458 [Zbl 0931.94010]  \\textit{Canetti, Ran; Malkin, Tal; Nissim, Kobbi}, Efficient communication-storage tradeoffs for multicast encryption, 459-474 [Zbl 0937.68043]","type":"string"},"datatype":"string"},"type":"statement","id":"Q1284397$1907F12B-D2CA-4E0B-A80E-8104B59B59A1","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1284397$6EAC9B1D-5F31-4674-B7F1-E75D3EEDE6EC","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1284397$E9A65C9D-4EFE-479E-994E-F3B23C6EF7B7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1284397$824F89D2-6A0F-4402-A583-23E5BD8D6974","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"6390c9cbb95343b8e06d01b8cf24802b8646bb44","datavalue":{"value":"1278606","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1284397$BD3A058B-B1BE-4E2F-9181-6976D5D10220","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"c0aa30c9bbca6402d32c13a132971934631af137","datavalue":{"value":"Prague (Czech Republic)","type":"string"},"datatype":"string"},"type":"statement","id":"Q1284397$2F6E1D72-5948-4C3D-853C-6131BAF849BF","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q1284397$49CE33B2-10C8-4323-84C6-F8CA43FCC3EC","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q1284397$B936EA1E-822F-4D06-AC34-5BE7853D81D0","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9a2e831edb4d0e64aac9c8c55170d599c69b78c7","datavalue":{"value":"EUROCRYPT '99","type":"string"},"datatype":"string"},"type":"statement","id":"Q1284397$C284508C-EB56-405B-BF26-E271EBD5E903","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9444c7e81fc487ab48d60d555be7e74462154789","datavalue":{"value":"Cryptology","type":"string"},"datatype":"string"},"type":"statement","id":"Q1284397$49876314-86C8-44A4-B35F-266BF566345E","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1284397$83C685C3-2ECD-4E8E-B2E6-744A532705EB","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Advances in cryptology - EUROCRYPT '99. 17th annual Eurocrypt conference, international conference on The theory and application of cryptographic techniques, Prague, Czech Republic, May 2--6, 1999. Proceedings","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Advances_in_cryptology_-_EUROCRYPT_%2799._17th_annual_Eurocrypt_conference,_international_conference_on_The_theory_and_application_of_cryptographic_techniques,_Prague,_Czech_Republic,_May_2--6,_1999._Proceedings"}}}}}