Advances in Cryptology EUROCRYPT '99 [Elektronische Ressource] : International Conference on the Theory and
Author: Stern, Jacques
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Computational complexity, Computer Communication Networks, Computer science, Computer science_xMathematics, Computer software, Data encryption (Computer science), Algorithm Analysis and Problem Complexity, Computational Mathematics and Numerical Analysis, Data Encryption, Discrete Mathematics in Computer Science
Publishers: Berlin, Heidelberg : Springer Berlin Heidelberg
Collections: journals contributions, journals
ISBN Number: 9783540658894, 3540658890
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 277.20 MB
PDF Size: 5.56 MB
Extensions: djvu, epub, gif, pdf, gz, zip, torrent, log, mrc
Edition: [Elektronische Ressource]
Downloads: 509
Views: 559
Total Files: 20
Media Type: texts
Total Files: 7
Last Modified: 2024-01-30 12:08:51
Size: 15.33 KB
Description
Author: Jacques Stern
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-65889-4
DOI: 10.1007/3-540-48910-X
Table of Contents:
- Cryptanalysis of RSA with Private Key d Less than N
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Software Performance of Universal Hash Functions
- Lower Bounds for Oblivious Transfer Reductions
- On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
- Conditional Oblivious Transfer and Timed-Release Encryption
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes
- Secure Hash-and-Sign Signatures Without the Random Oracle
- A Note on the Limits of Collusion-Resistant Watermarks
- Coin-Based Anonymous Fingerprinting
- On the Performance of Hyperelliptic Cryptosystems
- Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic
- Comparing the MOV and FR Reductions in Elliptic Curve Cryptography
- Unbalanced Oil and Vinegar Signature Schemes
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- New Public Key Cryptosystems Based on the Dependent-RSA Problems
- Resistance Against General Iterated Attacks
- XOR and Non-XOR Differential Probabilities
- S-boxes with Controllable Nonlinearity