Advances in Cryptology — CRYPTO '98

18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings

Editors:

ISBN: 978-3-540-64892-5 (Print) 978-3-540-68462-6 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Book Chapter

    Pages 1-12

    Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1

  3. Book Chapter

    Pages 13-25

    A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack

  4. Book Chapter

    Pages 26-45

    Relations among notions of security for public-key encryption schemes

  5. Book Chapter

    Pages 46-55

    Cryptography and the internet

  6. Book Chapter

    Pages 56-71

    Differential collisions in SHA-0

  7. Book Chapter

    Pages 72-88

    From differential cryptanalysis to ciphertext-only attacks

  8. Book Chapter

    Pages 89-104

    A simplified approach to threshold and proactive RSA

  9. Book Chapter

    Pages 105-120

    New efficient and secure protocols for verifiable signature sharing and other applications

  10. Book Chapter

    Pages 121-136

    Trading correctness for privacy in unconditional multi-party computation

  11. Book Chapter

    Pages 137-152

    Fast digital identity revocation

  12. Book Chapter

    Pages 153-168

    Self-delegation with controlled propagation — or — What if you lose your laptop

  13. Book Chapter

    Pages 169-185

    Identity escrow

  14. Book Chapter

    Pages 186-199

    Generalized birthday attacks on unbalanced Feistel networks

  15. Book Chapter

    Pages 200-211

    Quadratic relation of S-box and its application to the linear attack of full round DES

  16. Book Chapter

    Pages 212-222

    Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree

  17. Book Chapter

    Pages 223-242

    Cryptanalysis of the Ajtai-Dwork cryptosystem

  18. Book Chapter

    Pages 243-256

    Cryptanalysis of the Chor-Rivest cryptosystem

  19. Book Chapter

    Pages 257-266

    Cryptanalysis of the oil and vinegar signature scheme

  20. Book Chapter

    Pages 267-282

    From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs

  21. Book Chapter

    Pages 283-298

    Many-to-one trapdoor functions and their relation to public-key cryptosystems

previous Page of 2