Book Volume 1666 1999

Advances in Cryptology — CRYPTO’ 99

19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15–19, 1999 Proceedings


ISBN: 978-3-540-66347-8 (Print) 978-3-540-48405-9 (Online)

Table of contents (39 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XII

  2. Public-Key Cryptanalysis I

    1. Chapter

      Pages 1-18

      On the Security of RSA Padding

    2. Chapter

      Pages 19-30

      Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization

    3. Chapter

      Pages 31-46

      The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications

  3. Invited Lecture

    1. Chapter

      Pages 47-65

      Information-Theoretic Cryptography

  4. Secure Communication and Computation

    1. Chapter and Conference Paper

      Pages 65-79

      Information Theoretically Secure Communication in the Limited Storage Space Model

    2. Chapter

      Pages 80-97

      The All-or-Nothing Nature of Two-Party Secure Computation

  5. Distributed Cryptography

    1. Chapter

      Pages 98-116

      Adaptive Security for Threshold Cryptosystems

    2. Chapter and Conference Paper

      Pages 116-129

      Two Party RSA Key Generation

    3. Chapter

      Pages 130-147

      Robust Distributed Multiplication without Interaction

    4. Chapter

      Pages 148-164

      A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting

  6. Secret-Key Cryptography

    1. Chapter

      Pages 165-180

      Truncated Differentials and Skipjack

    2. Chapter

      Pages 181-197

      Fast Correlation Attacks Based on Turbo Code Techniques

    3. Chapter

      Pages 198-215

      Highly Nonlinear Resilient Functions Optimizing Siegenthaler’s Inequality

  7. Message Authentication Codes

    1. Chapter and Conference Paper

      Pages 216-233

      UMAC: Fast and Secure Message Authentication

    2. Chapter

      Pages 234-251

      Square Hash: Fast Message Authentication via Optimized Universal Hash Functions

    3. Chapter

      Pages 252-269

      Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions

    4. Chapter

      Pages 270-287

      Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier

  8. Public-Key Cryptanalysis II

    1. Chapter

      Pages 288-304

      Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto ’97

    2. Chapter

      Pages 305-314

      Weakness in Quaternion Signatures

    3. Chapter

      Pages 315-325

      Cryptanalysis of “2R” Schemes

previous Page of 2