© 1999

Advances in Cryptology — CRYPTO’ 99

19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15–19, 1999 Proceedings

  • Michael Wiener
Conference proceedings CRYPTO 1999

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1666)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Public-Key Cryptanalysis I

    1. Jean-Sébastien Coron, David Naccache, Julien P. Stern
      Pages 1-18
  3. Invited Lecture

    1. Ueli Maurer
      Pages 47-65
  4. Secure Communication and Computation

    1. Amos Beimel, Tal Malkin, Silvio Micali
      Pages 80-97
  5. Distributed Cryptography

    1. Ran Canetti, Rosario Gennaro, Stanisław Jarecki, Hugo Krawczyk, Tal Rabin
      Pages 98-116
    2. Niv Gilboa
      Pages 116-129
  6. Secret-Key Cryptography

    1. Lars R. Knudsen, M. J. B. Robshaw, David Wagner
      Pages 165-180
    2. Thomas Johansson, Fredrik Jönsson
      Pages 181-197
  7. Message Authentication Codes

    1. J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway
      Pages 216-233
    2. Mark Etzel, Sarvar Patel, Zulfikar Ramzan
      Pages 234-251
    3. Mihir Bellare, Oded Goldreich, Hugo Krawczyk
      Pages 270-287
  8. Public-Key Cryptanalysis II

About these proceedings


Crypto ’99, the Nineteenth Annual Crypto Conference, was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department, University of California, Santa Barbara (UCSB). The General Chair, Donald Beaver, was responsible for local organization and registration. The Program Committee considered 167 papers and selected 38 for presentation. This year’s conference program also included two invited lectures. I was pleased to include in the program UeliM aurer’s presentation “Information Theoretic Cryptography” and Martin Hellman’s presentation “The Evolution of Public Key Cryptography.” The program also incorporated the traditional Rump Session for informal short presentations of new results, run by Stuart Haber. These proceedings include the revised versions of the 38 papers accepted by the Program Committee. These papers were selected from all the submissions to the conference based on originality, quality, and relevance to the field of cryptology. Revisions were not checked, and the authors bear full responsibility for the contents of their papers.


Cryptographic Protocols Digital Signatures Distributed Cryptography Message Authentication Public-Key Cryptosystems communication cryptography

Editors and affiliations

  • Michael Wiener
    • 1
  1. 1.Entrust TechnologiesOttawaCanada

Bibliographic information