default search action
17th CRYPTO 1997: Santa Barbara, California, USA
- Burton S. Kaliski Jr.:
Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings. Lecture Notes in Computer Science 1294, Springer 1997, ISBN 3-540-63384-7
Complexity Theory
- Mikael Goldmann, Mats Näslund:
The Complexity of Computing Hard Core Predicates. 1-15 - Eiichiro Fujisaki, Tatsuaki Okamoto:
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. 16-30 - Giovanni Di Crescenzo, Tatsuaki Okamoto, Moti Yung:
Keeping the SZK-Verifier Honest Unconditionally. 31-45
Invited Lecture
- Oded Goldreich:
On the Foundations of Modern Cryptography. 46-74
Cryptographic Primitives
- Donald Beaver:
Plug and Play Encryption. 75-89 - Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky:
Deniable Encryption. 90-104
Lattice-Based Cryptography
- Oded Goldreich, Shafi Goldwasser, Shai Halevi:
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. 105-111 - Oded Goldreich, Shafi Goldwasser, Shai Halevi:
Public-Key Cryptosystems from Lattice Reduction Problems. 112-131
Digital Signatures
- Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
RSA-Based Undeniable Signatures. 132-149 - Ari Juels, Michael Luby, Rafail Ostrovsky:
Security of Blind Digital Signatures (Extended Abstract). 150-164 - Yuliang Zheng:
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). 165-179 - Rosario Gennaro, Pankaj Rohatgi:
How to Sign Digital Streams. 180-197
Cryptanalysis of Public-Key Cryptosystems (I)
- Phong Q. Nguyen, Jacques Stern:
Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. 198-212 - Thomas A. Berson:
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. 213-220 - Jean-François Misarsky:
A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy. 221-234
Cryptanalysis of Public-Key Cryptosystems (II)
- Daniel Bleichenbacher:
On the Security of the KMOV Public Key Cryptosystem. 235-248 - Chae Hoon Lim, Pil Joong Lee:
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. 249-263 - Adam L. Young, Moti Yung:
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. 264-276 - Mihir Bellare, Shafi Goldwasser, Daniele Micciancio:
"Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case. 277-291
Information Theory
- Christian Cachin, Ueli M. Maurer:
Unconditional Security Against Memory-Bounded Adversaries. 292-306 - Ueli M. Maurer, Stefan Wolf:
Privacy Amplification Secure Against Active Adversaries. 307-321 - Moni Naor, Benny Pinkas:
Visual Authentication and Identification. 322-336
Invited Lecture
- Gilles Brassard:
Quantum Information Processing: The Good, the Bad and the Ugly. 337-341
Elliptic Curve Implementation
- Jorge Guajardo, Christof Paar:
Efficient Algorithms for Elliptic Curve Cryptosystems. 342-356 - Jerome A. Solinas:
An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. 357-371
Number-Theoretic Systems
- Tsuyoshi Takagi:
Fast RSA-Type Cryptosystems Using N-Adic Expansion. 372-384 - Johannes Buchmann, Sachar Paulus:
A One Way Function Based on Ideal Arithmetic in Number Fields. 385-394
Distributed Cryptography
- Shlomi Dolev, Rafail Ostrovsky:
Efficient Anonymous Multicast and Reception (Extended Abstract). 395-409 - Jan Camenisch, Markus Stadler:
Efficient Group Signature Schemes for Large Groups (Extended Abstract). 410-424 - Dan Boneh, Matthew K. Franklin:
Efficient Generation of Shared RSA Keys (Extended Abstract). 425-439 - Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung:
Proactive RSA. 440-454
Hash Functions
- Ran Canetti:
Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. 455-469 - Mihir Bellare, Phillip Rogaway:
Collision-Resistant Hashing: Towards Making UOWHFs Practical. 470-484 - Lars R. Knudsen, Bart Preneel:
Fast and Secure Hashing Based on Codes. 485-498
Cryptanalysis of Secret-Key Cryptosystems
- Jovan Dj. Golic, Renato Menicocci:
Edit Distance Correlation Attack on the Alternating Step Generator. 499-512 - Eli Biham, Adi Shamir:
Differential Fault Analysis of Secret Key Cryptosystems. 513-525 - David A. Wagner, Bruce Schneier, John Kelsey:
Cryptanalysis of the Cellular Encryption Algorithm. 526-537
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.