Book Volume 1592 1999

Advances in Cryptology — EUROCRYPT ’99

International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2–6, 1999 Proceedings


ISBN: 978-3-540-65889-4 (Print) 978-3-540-48910-8 (Online)

Table of contents (32 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XII

  2. Cryptanalysis I

    1. Chapter

      Pages 1-11

      Cryptanalysis of RSA with Private Key d Less than N 0.292

    2. Chapter

      Pages 12-23

      Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials

  3. Hash Functions

    1. Chapter

      Pages 24-41

      Software Performance of Universal Hash Functions

  4. Foundations I

    1. Chapter

      Pages 42-55

      Lower Bounds for Oblivious Transfer Reductions

    2. Chapter

      Pages 56-73

      On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions

    3. Chapter

      Pages 74-89

      Conditional Oblivious Transfer and Timed-Release Encryption

  5. Public Key

    1. Chapter

      Pages 90-106

      An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)

    2. Chapter

      Pages 107-122

      Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes

    3. Chapter

      Pages 123-139

      Secure Hash-and-Sign Signatures Without the Random Oracle

  6. Watermarking and Fingerprinting

    1. Chapter

      Pages 140-149

      A Note on the Limits of Collusion-Resistant Watermarks

    2. Chapter

      Pages 150-164

      Coin-Based Anonymous Fingerprinting

  7. Elliptic Curve

    1. Chapter

      Pages 165-175

      On the Performance of Hyperelliptic Cryptosystems

    2. Chapter

      Pages 176-189

      Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic

    3. Chapter

      Pages 190-205

      Comparing the MOV and FR Reductions in Elliptic Curve Cryptography

  8. New Schemes

    1. Chapter

      Pages 206-222

      Unbalanced Oil and Vinegar Signature Schemes

    2. Chapter

      Pages 223-238

      Public-Key Cryptosystems Based on Composite Degree Residuosity Classes

    3. Chapter

      Pages 239-254

      New Public Key Cryptosystems Based on the Dependent-RSA Problems

  9. Block Ciphers

    1. Chapter

      Pages 255-271

      Resistance Against General Iterated Attacks

    2. Chapter

      Pages 272-285

      XOR and Non-XOR Differential Probabilities

    3. Chapter

      Pages 286-294

      S-boxes with Controllable Nonlinearity

previous Page of 2