
Advances in Cryptology - EUROCRYPT '99
By Jacques Stern
Subjects: Algorithm Analysis and Problem Complexity, Computational complexity, Computational Mathematics and Numerical Analysis, Computer Communication Networks, Data Encryption, Data encryption (Computer science), Computer science_xMathematics, Computer science, Computer software, Discrete Mathematics in Computer Science
Description: Advances in Cryptology — EUROCRYPT ’99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2–6, 1999 Proceedings<br />Author: Jacques Stern<br /> Published by Springer Berlin Heidelberg<br /> ISBN: 978-3-540-65889-4<br /> DOI: 10.1007/3-540-48910-X<br /><br />Table of Contents:<p></p><ul><li>Cryptanalysis of RSA with Private Key d Less than N </li><li>Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials </li><li>Software Performance of Universal Hash Functions </li><li>Lower Bounds for Oblivious Transfer Reductions </li><li>On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions </li><li>Conditional Oblivious Transfer and Timed-Release Encryption </li><li>An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract) </li><li>Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes </li><li>Secure Hash-and-Sign Signatures Without the Random Oracle </li><li>A Note on the Limits of Collusion-Resistant Watermarks </li><li>Coin-Based Anonymous Fingerprinting </li><li>On the Performance of Hyperelliptic Cryptosystems </li><li>Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic </li><li>Comparing the MOV and FR Reductions in Elliptic Curve Cryptography </li><li>Unbalanced Oil and Vinegar Signature Schemes </li><li>Public-Key Cryptosystems Based on Composite Degree Residuosity Classes </li><li>New Public Key Cryptosystems Based on the Dependent-RSA Problems </li><li>Resistance Against General Iterated Attacks </li><li>XOR and Non-XOR Differential Probabilities </li><li>S-boxes with Controllable Nonlinearity</li></ul>
Comments
You must log in to leave comments.