Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/crypto/crypto99.bht:"
@inproceedings{DBLP:conf/crypto/Abe99, author = {Masayuki Abe}, editor = {Michael J. Wiener}, title = {Robust Distributed Multiplicaton with out Interaction}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {130--147}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_9}, doi = {10.1007/3-540-48405-1\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Abe99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnB99, author = {Jee Hea An and Mihir Bellare}, editor = {Michael J. Wiener}, title = {Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {252--269}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_16}, doi = {10.1007/3-540-48405-1\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AumannR99, author = {Yonatan Aumann and Michael O. Rabin}, editor = {Michael J. Wiener}, title = {Information Theoretically Secure Communication in the Limited Storage Space Model}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {65--79}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_5}, doi = {10.1007/3-540-48405-1\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AumannR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeimelMM99, author = {Amos Beimel and Tal Malkin and Silvio Micali}, editor = {Michael J. Wiener}, title = {The All-or-Nothing Nature of Two-Party Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {80--97}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_6}, doi = {10.1007/3-540-48405-1\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeimelMM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareGK99, author = {Mihir Bellare and Oded Goldreich and Hugo Krawczyk}, editor = {Michael J. Wiener}, title = {Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {270--287}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_17}, doi = {10.1007/3-540-48405-1\_17}, timestamp = {Wed, 15 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BellareGK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareM99, author = {Mihir Bellare and Sara K. Miner}, editor = {Michael J. Wiener}, title = {A Forward-Secure Digital Signature Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {431--448}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_28}, doi = {10.1007/3-540-48405-1\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareS99, author = {Mihir Bellare and Amit Sahai}, editor = {Michael J. Wiener}, title = {Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {519--536}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_33}, doi = {10.1007/3-540-48405-1\_33}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlackHKKR99, author = {John Black and Shai Halevi and Hugo Krawczyk and Ted Krovetz and Phillip Rogaway}, editor = {Michael J. Wiener}, title = {{UMAC:} Fast and Secure Message Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {216--233}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_14}, doi = {10.1007/3-540-48405-1\_14}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlackHKKR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehDH99, author = {Dan Boneh and Glenn Durfee and Nick Howgrave{-}Graham}, editor = {Michael J. Wiener}, title = {Factoring {N} = p\({}^{\mbox{r}}\)q for Large r}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {326--337}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_21}, doi = {10.1007/3-540-48405-1\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehDH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehF99, author = {Dan Boneh and Matthew K. Franklin}, editor = {Michael J. Wiener}, title = {An Efficient Public Key Traitor Tracing Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {338--353}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_22}, doi = {10.1007/3-540-48405-1\_22}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BonehF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Boyko99, author = {Victor Boyko}, editor = {Michael J. Wiener}, title = {On the Security Properties of {OAEP} as an All-or-Nothing Transform}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {503--518}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_32}, doi = {10.1007/3-540-48405-1\_32}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Boyko99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CamenischM99, author = {Jan Camenisch and Markus Michels}, editor = {Michael J. Wiener}, title = {Separability and Efficiency for Generic Group Signature Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {413--430}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_27}, doi = {10.1007/3-540-48405-1\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CamenischM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiGJKR99, author = {Ran Canetti and Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin}, editor = {Michael J. Wiener}, title = {Adaptive Security for Threshold Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {98--115}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_7}, doi = {10.1007/3-540-48405-1\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiGJKR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChariJRR99, author = {Suresh Chari and Charanjit S. Jutla and Josyula R. Rao and Pankaj Rohatgi}, editor = {Michael J. Wiener}, title = {Towards Sound Approaches to Counteract Power-Analysis Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {398--412}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_26}, doi = {10.1007/3-540-48405-1\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChariJRR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Coppersmith99, author = {Don Coppersmith}, editor = {Michael J. Wiener}, title = {Weakness in Quaternion Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {305--314}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_19}, doi = {10.1007/3-540-48405-1\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Coppersmith99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronNS99, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Julien P. Stern}, editor = {Michael J. Wiener}, title = {On the Security of {RSA} Padding}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {1--18}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_1}, doi = {10.1007/3-540-48405-1\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronNS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CrescenzoO99, author = {Giovanni Di Crescenzo and Rafail Ostrovsky}, editor = {Michael J. Wiener}, title = {On Concurrent Zero-Knowledge with Pre-processing}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {485--502}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_31}, doi = {10.1007/3-540-48405-1\_31}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CrescenzoO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EtzelPR99, author = {Mark Etzel and Sarvar Patel and Zulfikar Ramzan}, editor = {Michael J. Wiener}, title = {{SQUARE} {HASH:} Fast Message Authenication via Optimized Universal Hash Functions}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {234--251}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_15}, doi = {10.1007/3-540-48405-1\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EtzelPR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FiatT99, author = {Amos Fiat and Tamir Tassa}, editor = {Michael J. Wiener}, title = {Dynamic Traitor Training}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {354--371}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_23}, doi = {10.1007/3-540-48405-1\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FiatT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FujisakiO99, author = {Eiichiro Fujisaki and Tatsuaki Okamoto}, editor = {Michael J. Wiener}, title = {Secure Integration of Asymmetric and Symmetric Encryption Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {537--554}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_34}, doi = {10.1007/3-540-48405-1\_34}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FujisakiO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GafniSY99, author = {Eli Gafni and Jessica Staddon and Yiqun Lisa Yin}, editor = {Michael J. Wiener}, title = {Efficient Methods for Integrating Traceability and Broadcast Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {372--387}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_24}, doi = {10.1007/3-540-48405-1\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GafniSY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarayJM99, author = {Juan A. Garay and Markus Jakobsson and Philip D. MacKenzie}, editor = {Michael J. Wiener}, title = {Abuse-Free Optimistic Contract Signing}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {449--466}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_29}, doi = {10.1007/3-540-48405-1\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarayJM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Gilboa99, author = {Niv Gilboa}, editor = {Michael J. Wiener}, title = {Two Party {RSA} Key Generation}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {116--129}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_8}, doi = {10.1007/3-540-48405-1\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Gilboa99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GilboaI99, author = {Niv Gilboa and Yuval Ishai}, editor = {Michael J. Wiener}, title = {Compressing Cryptographic Resources}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {591--608}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_37}, doi = {10.1007/3-540-48405-1\_37}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GilboaI99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldreichSV99, author = {Oded Goldreich and Amit Sahai and Salil P. Vadhan}, editor = {Michael J. Wiener}, title = {Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of {SZK} and {NISZK}}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {467--484}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_30}, doi = {10.1007/3-540-48405-1\_30}, timestamp = {Wed, 15 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoldreichSV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JohanssonJ99, author = {Thomas Johansson and Fredrik J{\"{o}}nsson}, editor = {Michael J. Wiener}, title = {Fast Correlation Attacks Based on Turbo Code Techniques}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {181--197}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_12}, doi = {10.1007/3-540-48405-1\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/JohanssonJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KipnisS99, author = {Aviad Kipnis and Adi Shamir}, editor = {Michael J. Wiener}, title = {Cryptanalysis of the {HFE} Public Key Cryptosystem by Relinearization}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {19--30}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_2}, doi = {10.1007/3-540-48405-1\_2}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KipnisS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KnudsenRW99, author = {Lars R. Knudsen and Matthew J. B. Robshaw and David A. Wagner}, editor = {Michael J. Wiener}, title = {Truncated Differentials and Skipjack}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {165--180}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_11}, doi = {10.1007/3-540-48405-1\_11}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KnudsenRW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KocherJJ99, author = {Paul C. Kocher and Joshua Jaffe and Benjamin Jun}, editor = {Michael J. Wiener}, title = {Differential Power Analysis}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {388--397}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_25}, doi = {10.1007/3-540-48405-1\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KocherJJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KumarRS99, author = {Ravi Kumar and Sridhar Rajagopalan and Amit Sahai}, editor = {Michael J. Wiener}, title = {Coding Constructions for Blacklisting Problems without Computational Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {609--623}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_38}, doi = {10.1007/3-540-48405-1\_38}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KumarRS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MaitraS99, author = {Subhamoy Maitra and Palash Sarkar}, editor = {Michael J. Wiener}, title = {Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {198--215}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_13}, doi = {10.1007/3-540-48405-1\_13}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MaitraS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Maurer99, author = {Ueli M. Maurer}, editor = {Michael J. Wiener}, title = {Information-Theoretic Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {47--64}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_4}, doi = {10.1007/3-540-48405-1\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Maurer99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorP99, author = {Moni Naor and Benny Pinkas}, editor = {Michael J. Wiener}, title = {Oblivious Transfer with Adaptive Queries}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {573--590}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_36}, doi = {10.1007/3-540-48405-1\_36}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Nguyen99, author = {Phong Q. Nguyen}, editor = {Michael J. Wiener}, title = {Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {288--304}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_18}, doi = {10.1007/3-540-48405-1\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Nguyen99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NguyenS99, author = {Phong Q. Nguyen and Jacques Stern}, editor = {Michael J. Wiener}, title = {The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {31--46}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_3}, doi = {10.1007/3-540-48405-1\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NguyenS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PoovendranB99, author = {Radha Poovendran and John S. Baras}, editor = {Michael J. Wiener}, title = {An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {624--638}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_39}, doi = {10.1007/3-540-48405-1\_39}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PoovendranB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SanderT99, author = {Tomas Sander and Amnon Ta{-}Shma}, editor = {Michael J. Wiener}, title = {Auditable, Anonymous Electronic Cash Extended Abstract}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {555--572}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_35}, doi = {10.1007/3-540-48405-1\_35}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SanderT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Schoenmakers99, author = {Berry Schoenmakers}, editor = {Michael J. Wiener}, title = {A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {148--164}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_10}, doi = {10.1007/3-540-48405-1\_10}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Schoenmakers99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YeLD99, author = {Dingfeng Ye and Kwok{-}Yan Lam and Zong{-}Duo Dai}, editor = {Michael J. Wiener}, title = {Cryptanalysis of "2 R" Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {315--325}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_20}, doi = {10.1007/3-540-48405-1\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YeLD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/1999, editor = {Michael J. Wiener}, title = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1}, doi = {10.1007/3-540-48405-1}, isbn = {3-540-66347-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.