Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings (Q1301510)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings
scientific article

    Statements

    Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings (English)
    0 references
    6 September 1999
    0 references
    The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 0895.00067]. Indexed articles: \textit{Coron, Jean-Sébastien; Naccache, David; Stern, Julien P.}, On the security of RSA padding, 1-18 [Zbl 0940.94010] \textit{Kipnis, Aviad; Shamir, Adi}, Cryptanalysis of the HFE public key cryptosystem by relinearization, 19-30 [Zbl 0940.94012] \textit{Nguyen, Phong; Stern, Jacques}, The hardness of the hidden subset sum problem and its cryptographic implications, 31-46 [Zbl 0940.94015] \textit{Maurer, Ueli}, Information-theoretic cryptography. (Extended abstract), 47-64 [Zbl 0940.94014] \textit{Aumann, Yonatan; Rabin, Michael O.}, Information theoretically secure communication in the limited storage space model, 65-79 [Zbl 0940.94007] \textit{Beimel, Amos; Malkin, Tal; Micali, Silvio}, The all-or-nothing nature of two-party secure computation, 80-97 [Zbl 0940.94008] \textit{Canetti, Ran; Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal}, Adaptive security for threshold cryptosystems, 98-115 [Zbl 0972.94031] \textit{Gilboa, Niv}, Two party RSA key generation. (Extended abstract), 116-129 [Zbl 0940.94011] \textit{Abe, Masayuki}, Robust distributed multiplication without interaction, 130-147 [Zbl 0940.94005] \textit{Schoenmakers, Berry}, A simple publicly verifiable secret sharing scheme and its application to electronic voting, 148-164 [Zbl 0940.94016] \textit{Knudsen, Lars R.; Robshaw, M. J. B.; Wagner, David}, Truncated differentials and skipjack, 165-180 [Zbl 0940.94013] \textit{Johansson, Thomas; Jönsson, Fredrik}, Fast correlation attacks based on turbo code techniques, 181-197 [Zbl 0954.94008] \textit{Maitra, Subhamoy; Sarkar, Palash}, Highly nonlinear resilient functions optimizing Siegenthaler's inequality, 198-215 [Zbl 1041.94011] \textit{Black, J.; Halevi, S.; Krawczyk, H.; Krovetz, T.; Rogaway, P.}, UMAC: Fast and secure message authentication, 216-233 [Zbl 0940.94020] \textit{Etzel, Mark; Patel, Sarvar; Ramzan, Zulfikar}, SQUARE HASH: Fast message authentication via optimized universal hash functions, 234-251 [Zbl 0940.94021] \textit{An, Jee Hea; Bellare, Mihir}, Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions, 252-269 [Zbl 0940.94018] \textit{Bellare, Mihir; Goldreich, Oded; Krawczyk, Hugo}, Stateless evaluation of pseudorandom functions: Security beyond the birthday barrier, 270-287 [Zbl 0940.94019] \textit{Nguyen, Phong}, Cryptanalysis of the Goldreich-Goldwasser-Halevi cryptosystem from Crypto '97, 288-304 [Zbl 1038.94543] \textit{Coppersmith, Don}, Weakness in quaternion signatures, 305-314 [Zbl 0976.94028] \textit{Ye, Ding-Feng; Lam, Kwok-Yan; Dai, Zongduo}, Cryptanalysis of ``\(2R\)'' schemes, 315-325 [Zbl 0940.94017] \textit{Boneh, Dan; Durfee, Glenn; Howgrave-Graham, Nick}, Factoring \(N=p^rq\) for large \(r\), 326-337 [Zbl 1007.11077] \textit{Boneh, Dan; Franklin, Matthew}, An efficient public key traitor tracing scheme. (Extended abstract), 338-353 [Zbl 0972.94029] \textit{Fiat, Amos; Tassa, Tamir}, Dynamic traitor tracing, 354-371 [Zbl 0942.94006] \textit{Gafni, Eli; Staddon, Jessica; Yin, Yiqun Lisa}, Efficient methods for integrating traceability and broadcast encryption, 372-387 [Zbl 0942.94007] \textit{Kocher, Paul; Jaffe, Joshua; Jun, Benjamin}, Differential power analysis, 388-397 [Zbl 0942.94501] \textit{Chari, Suresh; Jutla, Charanjit S.; Rao, Josyula R.; Rohatgi, Pankaj}, Towards sound approaches to counteract power-analysis attacks, 398-412 [Zbl 0942.68045] \textit{Camenisch, Jan; Michels, Markus}, Separability and efficiency for generic group signature schemes. (Extended abstract), 413-430 [Zbl 0942.94033] \textit{Bellare, Mihir; Miner, Sara K.}, A forward-secure digital signature scheme, 431-448 [Zbl 0942.94026] \textit{Tiuryn, Jerzy}, Type reconstruction for functional programs with subtyping over a lattice of atomic types, 443-453 [Zbl 0952.68032] \textit{Garay, Juan A.; Jakobsson, Markus; MacKenzie, Philip}, Abuse-free optimistic contract signing, 449-466 [Zbl 0942.94027] \textit{Goldreich, Oded; Sahai, Amit; Vadhan, Salil}, Can statistical zero knowledge be made non-interactive? or On the relationship of \({\mathcal {SZK}}\) and \({\mathcal {NISZK}}\). (Extended abstract), 467-484 [Zbl 0942.68046] \textit{Di Crescenzo, Giovanni; Ostrovsky, Rafail}, On concurrent zero-knowledge with pre-processing. (Extended abstract), 485-502 [Zbl 0942.68044] \textit{Boyko, Victor}, On the security properties of OAEP as an all-or-nothing transform, 503-518 [Zbl 0942.94017] \textit{Bellare, Mihir; Sahai, Amit}, Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization, 519-536 [Zbl 0942.94024] \textit{Fujisaki, Eiichiro; Okamoto, Tatsuaki}, Secure integration of asymmetric and symmetric encryption schemes, 537-554 [Zbl 0942.94019] \textit{Sander, Tomas; Ta-Shma, Amnon}, Auditable, anonymous electronic cash. (Extended abstract), 555-572 [Zbl 0949.68530] \textit{Naor, Moni; Pinkas, Benny}, Oblivious transfer with adaptive queries, 573-590 [Zbl 0942.94011] \textit{Gilboa, Niv; Ishai, Yuval}, Compressing cryptographic resources. (Extended abstract), 591-608 [Zbl 0972.94035] \textit{Kumar, Ravi; Rajagopalan, Sridhar; Sahai, Amit}, Coding constructions for blacklisting problems without computational assumptions, 609-623 [Zbl 0942.94004] \textit{Poovendran, R.; Baras, J. S.}, An information theoretic analysis of rooted-tree based secure multicast key distribution schemes, 624-638 [Zbl 0942.94025]
    0 references
    Santa Barbara, CA (USA)
    0 references
    Proceedings
    0 references
    Conference
    0 references
    CRYPTO '99
    0 references
    Cryptology
    0 references

    Identifiers