Search dblp for Publications

export results for "toc:db/conf/crypto/crypto99.bht:"

 download as .bib file

@inproceedings{DBLP:conf/crypto/Abe99,
  author       = {Masayuki Abe},
  editor       = {Michael J. Wiener},
  title        = {Robust Distributed Multiplicaton with out Interaction},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {130--147},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_9},
  doi          = {10.1007/3-540-48405-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Abe99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnB99,
  author       = {Jee Hea An and
                  Mihir Bellare},
  editor       = {Michael J. Wiener},
  title        = {Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened
                  Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {252--269},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_16},
  doi          = {10.1007/3-540-48405-1\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AumannR99,
  author       = {Yonatan Aumann and
                  Michael O. Rabin},
  editor       = {Michael J. Wiener},
  title        = {Information Theoretically Secure Communication in the Limited Storage
                  Space Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {65--79},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_5},
  doi          = {10.1007/3-540-48405-1\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AumannR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeimelMM99,
  author       = {Amos Beimel and
                  Tal Malkin and
                  Silvio Micali},
  editor       = {Michael J. Wiener},
  title        = {The All-or-Nothing Nature of Two-Party Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {80--97},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_6},
  doi          = {10.1007/3-540-48405-1\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeimelMM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareGK99,
  author       = {Mihir Bellare and
                  Oded Goldreich and
                  Hugo Krawczyk},
  editor       = {Michael J. Wiener},
  title        = {Stateless Evaluation of Pseudorandom Functions: Security beyond the
                  Birthday Barrier},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {270--287},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_17},
  doi          = {10.1007/3-540-48405-1\_17},
  timestamp    = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareGK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareM99,
  author       = {Mihir Bellare and
                  Sara K. Miner},
  editor       = {Michael J. Wiener},
  title        = {A Forward-Secure Digital Signature Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {431--448},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_28},
  doi          = {10.1007/3-540-48405-1\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareS99,
  author       = {Mihir Bellare and
                  Amit Sahai},
  editor       = {Michael J. Wiener},
  title        = {Non-malleable Encryption: Equivalence between Two Notions, and an
                  Indistinguishability-Based Characterization},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {519--536},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_33},
  doi          = {10.1007/3-540-48405-1\_33},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlackHKKR99,
  author       = {John Black and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Ted Krovetz and
                  Phillip Rogaway},
  editor       = {Michael J. Wiener},
  title        = {{UMAC:} Fast and Secure Message Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {216--233},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_14},
  doi          = {10.1007/3-540-48405-1\_14},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlackHKKR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehDH99,
  author       = {Dan Boneh and
                  Glenn Durfee and
                  Nick Howgrave{-}Graham},
  editor       = {Michael J. Wiener},
  title        = {Factoring {N} = p\({}^{\mbox{r}}\)q for Large r},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {326--337},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_21},
  doi          = {10.1007/3-540-48405-1\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehDH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehF99,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  editor       = {Michael J. Wiener},
  title        = {An Efficient Public Key Traitor Tracing Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {338--353},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_22},
  doi          = {10.1007/3-540-48405-1\_22},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Boyko99,
  author       = {Victor Boyko},
  editor       = {Michael J. Wiener},
  title        = {On the Security Properties of {OAEP} as an All-or-Nothing Transform},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {503--518},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_32},
  doi          = {10.1007/3-540-48405-1\_32},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Boyko99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischM99,
  author       = {Jan Camenisch and
                  Markus Michels},
  editor       = {Michael J. Wiener},
  title        = {Separability and Efficiency for Generic Group Signature Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {413--430},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_27},
  doi          = {10.1007/3-540-48405-1\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CamenischM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiGJKR99,
  author       = {Ran Canetti and
                  Rosario Gennaro and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Michael J. Wiener},
  title        = {Adaptive Security for Threshold Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {98--115},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_7},
  doi          = {10.1007/3-540-48405-1\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiGJKR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChariJRR99,
  author       = {Suresh Chari and
                  Charanjit S. Jutla and
                  Josyula R. Rao and
                  Pankaj Rohatgi},
  editor       = {Michael J. Wiener},
  title        = {Towards Sound Approaches to Counteract Power-Analysis Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {398--412},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_26},
  doi          = {10.1007/3-540-48405-1\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChariJRR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Coppersmith99,
  author       = {Don Coppersmith},
  editor       = {Michael J. Wiener},
  title        = {Weakness in Quaternion Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {305--314},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_19},
  doi          = {10.1007/3-540-48405-1\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Coppersmith99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronNS99,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Julien P. Stern},
  editor       = {Michael J. Wiener},
  title        = {On the Security of {RSA} Padding},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_1},
  doi          = {10.1007/3-540-48405-1\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronNS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CrescenzoO99,
  author       = {Giovanni Di Crescenzo and
                  Rafail Ostrovsky},
  editor       = {Michael J. Wiener},
  title        = {On Concurrent Zero-Knowledge with Pre-processing},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {485--502},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_31},
  doi          = {10.1007/3-540-48405-1\_31},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CrescenzoO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EtzelPR99,
  author       = {Mark Etzel and
                  Sarvar Patel and
                  Zulfikar Ramzan},
  editor       = {Michael J. Wiener},
  title        = {{SQUARE} {HASH:} Fast Message Authenication via Optimized Universal
                  Hash Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {234--251},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_15},
  doi          = {10.1007/3-540-48405-1\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EtzelPR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FiatT99,
  author       = {Amos Fiat and
                  Tamir Tassa},
  editor       = {Michael J. Wiener},
  title        = {Dynamic Traitor Training},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {354--371},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_23},
  doi          = {10.1007/3-540-48405-1\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FiatT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FujisakiO99,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto},
  editor       = {Michael J. Wiener},
  title        = {Secure Integration of Asymmetric and Symmetric Encryption Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {537--554},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_34},
  doi          = {10.1007/3-540-48405-1\_34},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FujisakiO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GafniSY99,
  author       = {Eli Gafni and
                  Jessica Staddon and
                  Yiqun Lisa Yin},
  editor       = {Michael J. Wiener},
  title        = {Efficient Methods for Integrating Traceability and Broadcast Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {372--387},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_24},
  doi          = {10.1007/3-540-48405-1\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GafniSY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarayJM99,
  author       = {Juan A. Garay and
                  Markus Jakobsson and
                  Philip D. MacKenzie},
  editor       = {Michael J. Wiener},
  title        = {Abuse-Free Optimistic Contract Signing},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {449--466},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_29},
  doi          = {10.1007/3-540-48405-1\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarayJM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Gilboa99,
  author       = {Niv Gilboa},
  editor       = {Michael J. Wiener},
  title        = {Two Party {RSA} Key Generation},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {116--129},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_8},
  doi          = {10.1007/3-540-48405-1\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Gilboa99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GilboaI99,
  author       = {Niv Gilboa and
                  Yuval Ishai},
  editor       = {Michael J. Wiener},
  title        = {Compressing Cryptographic Resources},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {591--608},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_37},
  doi          = {10.1007/3-540-48405-1\_37},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GilboaI99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldreichSV99,
  author       = {Oded Goldreich and
                  Amit Sahai and
                  Salil P. Vadhan},
  editor       = {Michael J. Wiener},
  title        = {Can Statistical Zero Knowledge Be Made Non-interactive? or On the
                  Relationship of {SZK} and {NISZK}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {467--484},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_30},
  doi          = {10.1007/3-540-48405-1\_30},
  timestamp    = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldreichSV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JohanssonJ99,
  author       = {Thomas Johansson and
                  Fredrik J{\"{o}}nsson},
  editor       = {Michael J. Wiener},
  title        = {Fast Correlation Attacks Based on Turbo Code Techniques},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_12},
  doi          = {10.1007/3-540-48405-1\_12},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/JohanssonJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KipnisS99,
  author       = {Aviad Kipnis and
                  Adi Shamir},
  editor       = {Michael J. Wiener},
  title        = {Cryptanalysis of the {HFE} Public Key Cryptosystem by Relinearization},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {19--30},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_2},
  doi          = {10.1007/3-540-48405-1\_2},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KipnisS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KnudsenRW99,
  author       = {Lars R. Knudsen and
                  Matthew J. B. Robshaw and
                  David A. Wagner},
  editor       = {Michael J. Wiener},
  title        = {Truncated Differentials and Skipjack},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {165--180},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_11},
  doi          = {10.1007/3-540-48405-1\_11},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KnudsenRW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KocherJJ99,
  author       = {Paul C. Kocher and
                  Joshua Jaffe and
                  Benjamin Jun},
  editor       = {Michael J. Wiener},
  title        = {Differential Power Analysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {388--397},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_25},
  doi          = {10.1007/3-540-48405-1\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KocherJJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KumarRS99,
  author       = {Ravi Kumar and
                  Sridhar Rajagopalan and
                  Amit Sahai},
  editor       = {Michael J. Wiener},
  title        = {Coding Constructions for Blacklisting Problems without Computational
                  Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {609--623},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_38},
  doi          = {10.1007/3-540-48405-1\_38},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KumarRS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MaitraS99,
  author       = {Subhamoy Maitra and
                  Palash Sarkar},
  editor       = {Michael J. Wiener},
  title        = {Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {198--215},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_13},
  doi          = {10.1007/3-540-48405-1\_13},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MaitraS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Maurer99,
  author       = {Ueli M. Maurer},
  editor       = {Michael J. Wiener},
  title        = {Information-Theoretic Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {47--64},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_4},
  doi          = {10.1007/3-540-48405-1\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Maurer99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorP99,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Michael J. Wiener},
  title        = {Oblivious Transfer with Adaptive Queries},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {573--590},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_36},
  doi          = {10.1007/3-540-48405-1\_36},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Nguyen99,
  author       = {Phong Q. Nguyen},
  editor       = {Michael J. Wiener},
  title        = {Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from
                  Crypto '97},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {288--304},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_18},
  doi          = {10.1007/3-540-48405-1\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Nguyen99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NguyenS99,
  author       = {Phong Q. Nguyen and
                  Jacques Stern},
  editor       = {Michael J. Wiener},
  title        = {The Hardness of the Hidden Subset Sum Problem and Its Cryptographic
                  Implications},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_3},
  doi          = {10.1007/3-540-48405-1\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NguyenS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PoovendranB99,
  author       = {Radha Poovendran and
                  John S. Baras},
  editor       = {Michael J. Wiener},
  title        = {An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast
                  Key Distribution Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {624--638},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_39},
  doi          = {10.1007/3-540-48405-1\_39},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PoovendranB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SanderT99,
  author       = {Tomas Sander and
                  Amnon Ta{-}Shma},
  editor       = {Michael J. Wiener},
  title        = {Auditable, Anonymous Electronic Cash Extended Abstract},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {555--572},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_35},
  doi          = {10.1007/3-540-48405-1\_35},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SanderT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Schoenmakers99,
  author       = {Berry Schoenmakers},
  editor       = {Michael J. Wiener},
  title        = {A Simple Publicly Verifiable Secret Sharing Scheme and Its Application
                  to Electronic},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {148--164},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_10},
  doi          = {10.1007/3-540-48405-1\_10},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Schoenmakers99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YeLD99,
  author       = {Dingfeng Ye and
                  Kwok{-}Yan Lam and
                  Zong{-}Duo Dai},
  editor       = {Michael J. Wiener},
  title        = {Cryptanalysis of "2 R" Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {315--325},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_20},
  doi          = {10.1007/3-540-48405-1\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YeLD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1999,
  editor       = {Michael J. Wiener},
  title        = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1},
  doi          = {10.1007/3-540-48405-1},
  isbn         = {3-540-66347-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics