Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin |
On 2-Round Secure Multiparty Computation. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
lower bounds, Secure multiparty computation, round complexity |
1 | Jakob Jonsson, Burton S. Kaliski Jr. |
On the Security of RSA Encryption in TLS. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
key encapsulation, RSA encryption, TLS |
1 | Dani Halevy, Adi Shamir |
The LSD Broadcast Encryption Scheme. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Anna Lysyanskaya |
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Unique signatures, verifiable random functions, application of groups with DH-DDH separation |
1 | Jesper Buus Nielsen |
A Threshold Pseudorandom Function Construction and Its Applications. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Anna Lysyanskaya |
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
anonymity, group signatures, certificate revocation, credential systems, identity escrow, Dynamic accumulators |
1 | Wen-Ching W. Li, Mats Näslund, Igor E. Shparlinski |
Hidden Number Problem with the Trace and Bit Security of XTR and LUC. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | John Black, Phillip Rogaway, Thomas Shrimpton |
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Joy Algesheimer, Jan Camenisch, Victor Shoup |
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
safe primes, distributed primality test, RSA, threshold cryptography |
1 | Ilya Mironov |
(Not So) Random Shuffles of RC4. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Bresson, Jacques Stern, Michael Szydlo |
Threshold Ring Signatures and Applications to Ad-hoc Groups. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Claude Carlet |
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
stream ciphers, nonlinearity, resilient functions |
1 | Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 |
Tweakable Block Ciphers. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
tweakable block ciphers, initialization vector, block ciphers, modes of operation |
1 | Moti Yung (eds.) |
Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Nicholas J. Hopper, John Langford 0001, Luis von Ahn |
Provably Secure Steganography. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Gene Itkis, Leonid Reyzin |
SiBIR: Signer-Base Intrusion-Resilient Signatures. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Phong Q. Nguyen, David Pointcheval |
Analysis and Improvements of NTRU Encryption Paddings. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | David A. Wagner 0001 |
A Generalized Birthday Problem. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier |
Universal Padding Schemes for RSA. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Probabilistic Signature Scheme, Provable Security |
1 | Karl Rubin, Alice Silverberg |
Supersingular Abelian Varieties in Cryptology. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron |
Security Proof for Partial-Domain Hash Signature Schemes. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Provable Security, Random Oracle Model, Signature Schemes |
1 | Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, Michael Scott |
Efficient Algorithms for Pairing-Based Cryptosystems. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Don Coppersmith, Shai Halevi, Charanjit S. Jutla |
Cryptanalysis of Stream Ciphers with Linear Masking. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Linear masking, Low-Diffusion attacks, Stream ciphers, Hypothesis testing, Linear cryptanalysis |
1 | Palash Sarkar 0001 |
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
synchronous stream ciphers, nonlinear filter model, nonlinear combiner model, filter-combiner model, cellular automata, linear feedback shift registers |
1 | Sean Murphy, Matthew J. B. Robshaw |
Essential Algebraic Structure within the AES. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
(Finite) Galois Field, (Field) Conjugate, Multivariate Quadratic (MQ) Equations, Advanced Encryption Standard, AES, Rijndael, Algebraic Structure, BES |
1 | Moni Naor |
Deniable Ring Authentication. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Robert P. Gallant, Robert J. Lambert, Scott A. Vanstone |
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Igor E. Shparlinski |
On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Dalit Naor, Moni Naor, Jeffery Lotspiech |
Revocation and Tracing Schemes for Stateless Receivers. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
Revocation scheme, Tracing scheme, Copyright Protection, Broadcast Encryption |
1 | Yan Zong Ding |
Oblivious Transfer in the Bounded Storage Model. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Matthew K. Franklin |
Identity-Based Encryption from the Weil Pairing. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Boaz Barak, Oded Goldreich 0001, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang 0005 |
On the (Im)possibility of Obfuscating Programs. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Alfredo De Santis, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano, Amit Sahai |
Robust Non-interactive Zero Knowledge. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache |
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
fixed-pattern padding, affine redundancy, RSA signatures |
1 | James Manger |
A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
PKCS, RSA, chosen ciphertext attack, OAEP |
1 | Oded Goldreich 0001, Yehuda Lindell |
Session-Key Generation Using Human Passwords Only. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jun Furukawa 0001, Kazue Sako |
An Efficient Scheme for Proving a Shuffle. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
Universal Verifiability, Permutation, Electronic Voting, Mix-net |
1 | Ronald Cramer, Ivan Damgård |
Secure Distributed Linear Algebra in a Constant Number of Rounds. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Gene Itkis, Leonid Reyzin |
Forward-Secure Signatures with Optimal Signing and Verifying. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Eonkyung Lee, Sangjin Lee, Sang Geun Hahn |
Pseudorandomness from Braid Groups. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Martin Hirt, Ueli M. Maurer |
Robustness for Free in Unconditional Multi-party Computation. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Joe Kilian (eds.) |
Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jung Hee Cheon |
Nonlinear Vector Resilient Functions. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
linearized polynomials, nonlinearity, correlation immunity, Resilient functions |
1 | Silvio Micali, Leonid Reyzin |
Soundness in the Public-Key Model. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup |
Secure and Efficient Asynchronous Broadcast Protocols. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Anna Lysyanskaya |
An Identity Escrow Scheme with Appointed Verifiers. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
formal model for group signatures, group signatures, privacy protection, Identity escrow |
1 | Adi Shamir, Yael Tauman |
Improved Online/Offline Signature Schemes. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
on-line/off-line, trapdoor hash functions, signature schemes |
1 | Aggelos Kiayias, Moti Yung |
Self Protecting Pirates and Black-Box Traitor Tracing. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Krawczyk |
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongtaek Chee, Choonsik Park |
New Public Key Cryptosystem Using Finite Non Abelian Groups. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jovan Dj. Golic |
Correlation Analysis of the Shrinking Generator. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
unconstrained irregular clocking, Stream ciphers, fast correlation attacks, posterior probabilities |
1 | Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern |
RSA-OAEP Is Secure under the RSA Assumption. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell |
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Victor Shoup |
OAEP Reconsidered. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Marc Fischlin |
Universally Composable Commitments. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
security analysis of protocols, non-malleability, Commitment schemes, concurrent composition |
1 | Matthias Fitzi, Juan A. Garay, Ueli M. Maurer, Rafail Ostrovsky |
Minimal Complete Primitives for Secure Multi-party Computation. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Philip D. MacKenzie, Michael K. Reiter |
Two-Party Generation of DSA Signatures. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh |
Simplified OAEP for the RSA and Rabin Functions. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Cramer, Ivan Damgård, Serge Fehr |
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre |
Online Ciphers and the Hash-CBC Construction. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Juan A. Garay, Jessica Staddon, Avishai Wool |
Long-Lived Broadcast Encryption. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Alon Rosen |
A Note on the Round-Complexity of Concurrent Zero-Knowledge. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron |
On the Exact Security of Full Domain Hash. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell, Benny Pinkas |
Privacy Preserving Data Mining. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Jürgen Bierbrauer, Holger Schellwat |
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
Low bias, almost independent arrays, Hermitian codes, Suzuki codes, Weil-Carlitz-Uchiyama bound, exponential sum method, Zyablov bound, authentication, Fourier transform, hashing, resiliency, Reed-Solomon codes |
1 | Anand Desai |
New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Zulfikar Ramzan, Leonid Reyzin |
On the Round Security of Symmetric-Key Cryptographic Primitives. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Michael Semanko |
L-collision Attacks against Randomized MACs. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
L-collision, MACs, randomness, message authentication codes, birthday attacks |
1 | Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth |
Weaknesses in the SL2(IFs2) Hashing Scheme. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Ingrid Biehl, Bernd Meyer 0002, Volker Müller 0001 |
Differential Fault Attacks on Elliptic Curve Cryptosystems. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
differential fault attack, elliptic curve cryptosystem |
1 | Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama |
Quantum Public-Key Cryptosystems. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin, Roger Fischlin |
Efficient Non-malleable Commitment Schemes. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Muxiang Zhang, Agnes Hui Chan |
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Éliane Jaulmes, Antoine Joux |
A Chosen-Ciphertext Attack against NTRU. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini, Yejing Wang |
Sequential Traitor Tracing. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | John Black, Phillip Rogaway |
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Moni Naor |
Timed Commitments. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare (eds.) |
Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Christian Cachin, Jan Camenisch |
Optimistic Fair Secure Computation. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Arjen K. Lenstra, Eric R. Verheul |
The XTR Public Key System. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik |
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes |
1 | Martín Abadi |
Taming the Adversary. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Jesper Buus Nielsen |
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Johansson 0001, Fredrik Jönsson |
Fast Correlation Attacks through Reconstruction of Linear Polynomials. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
reconstruction of polynomials, Stream ciphers, learning theory, correlation attacks |
1 | Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park |
New Public-Key Cryptosystem Using Braid Groups. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
hard problem, non-commutative group, public key cryptosystem, public key infrastructure, key exchange, one-way function, braid group, conjugacy problem |
1 | Amos Beimel, Yuval Ishai, Tal Malkin |
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Silvio Micali |
Parallel Reducibility for Information-Theoretically Secure Computation. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Gisin, Stefan Wolf 0001 |
Linking Classical and Quantum Key Agreement: Is There "Bound Information"? |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
intrinsic information, secret-key rate, quantum privacy amplification, purification, entanglement, Secret-key agreement |
1 | Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell |
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Message Authentication Codes, CBC-MAC |
1 | Yevgeniy Dodis, Shai Halevi, Tal Rabin |
A Cryptographic Solution to a Game Theoretic Problem. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Anand Desai |
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Rosario Gennaro |
An Improved Pseudo-random Generator Based on Discrete Log. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Palash Sarkar 0001, Subhamoy Maitra |
Nonlinearity Bounds and Constructions of Resilient Boolean Functions. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
combinatorial cryptography, boolean functions, stream ciphers, resiliency, nonlinearity, balancedness, correlation immunity, algebraic degree |
1 | Masayuki Abe, Tatsuaki Okamoto |
Provably Secure Partially Blind Signatures. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
Partially Blind Signatures, Blind Signatures, Witness Indistinguishability |
1 | Aviad Kipnis, Adi Shamir |
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Sara K. Miner |
A Forward-Secure Digital Signature Scheme. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Berry Schoenmakers |
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Markus Michels |
Separability and Efficiency for Generic Group Signature Schemes. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway |
UMAC: Fast and Secure Message Authentication. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Don Coppersmith |
Weakness in Quaternion Signatures. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|