- Specialized integer factorization
Don Coppersmith
- Towards a better understanding of one-wayness:
Facing linear permutations
Alain P. Hiltgen
- On the propagation criterion of degree l and order k
Claude Carlet
- A cryptosystem based on non-maximal imaginary quadratic orders
with fast decryption
Detleif Hühnlein, Michael J. Jacobson, Sachar Paulus, and
Tsuyoshi Takagi
- Optimum traitor tracing and asymmetric schemes
Kaoru Kurosawa and Yvo Desmedt
- Secure communication in minimal connectivity models
Matthew Franklin and Rebecca N. Wright
- Differential-linear weak key classes of IDEA
Philip Hawkes
- Security analysis of a practical "on the fly" authentication
and signature generation
Guillaume Poupard and Jacques Stern
- Computing discrete logarithms with quadratic number rings
Damian Weber
- Cryptanalysis of the ANSI X9.52 CBCM mode
Eli Biham and Lars R. Knudsen
- Secret sharing schemes with bipartite access structure
Carles Padró and Germaán Sáez
- Securing threshold cryptosystems against chosen ciphertext attack
Victor Shoup and Rosario Gennaro
- Optimistic fair exchange of digital signatures
N. Asokan and Victor Shoup
- Equivalence of counting the number of points on elliptic curve over
the ring Z_n and factoring n
Noboru Kunihiro and Kenji Koyama
- Generic constructions for secure and efficient confirmer
signature schemes
Markus Michels and Markus Stadler
- Strengthened security for blind signatures
David Pointcheval
- A practical and provably secure scheme for publicly veriafiable
secret sharing and its applications
Eiichiro Fujisaki and Tatsuaki Okamoto
- A new public-key cryptosystem as secure as factoring
Tatsuaki Okamoto and Shigenori Uchiyama
- Security of an identity-based cryptosystem and the related
reductions
Shigenori Uchiyama and Tatsuaki Okamoto
- How to improve an exponentiation black-box
Gérard Cohen, Antoine Lobstein, David Naccache, and
Gilles Zémor
- Highly nonlinear balanced Boolean functions with a good correlation
immunity
Éric Filiol and Caroline Fontaine
- Easy come - easy go divisible cash
Agnes Chan, Yair Frankel, and Yiannis Tsiounis
- A formal treatment of remotely keyed encryption
Matt Blaze, Joan Feigenbaum, and Moni Naor
- Lower bounds on generic algorithms in groups
Ueli Maurer and Stefan Wolf
- Divertible protocols and atomic proxy cryptography
Matt Blaze, Gerrit Bleumer, and Martin Strauss
- New results on multi-receiver authentication codes
Rei Safavi-Naini and Huaxiong Wang
- Finding collisions on a one-way street: Can secure hash
functions be based on general assumptions?
Daniel R. Simon
- Improved algorithms for isomorphisms of polynomials
Jacques Patarin, Louis Goubin and Nicolas Courtois
- Improved cryptanalysis of RC5
Alex Biryukov and Eyal Kushilevitz
- Breaking RSA may not be equivalent to factoring
Dan Boneh and Ramarathnam Venkatesan
- Auto-recoverable auto-certifiable cryptosystems
Adam Young and Moti Yung
- Luby-Rackoff backwards: Increasing security by making
block ciphers non-invertible
Mihir Bellare, Ted Krovetz, and Phillip Rogaway
- A practical mix
Markus Jakobsson
- Heuristic design of cryptographically strong balanced
Boolean functions
William Millan, Andrew Clark, and Ed Dawson
- On finding small solutions of modular multivariate
polynomial equations
Charanjit S. Jutla
- Combinatorial bounds for broadcast encryption
Michael Luby and Jessica Staddon
- Universally verifiable mix-net with verification work
independent of the number of mix-servers
Masayuki Abe
- Fast batch verification for modular exponentiation and digital
signatures
Mihir Bellare, Juan A. Garay, and Tal Rabin
- Visual cryptanalysis
Adi Shamir
- Secure and efficient metering
Moni Naor and Benny Pinkas
- Speeding up discrete log and factoring based schemes via
precomputations
Victor Boyko, Marcus Peinado, and Ramarathnam Venkatesan
- On the foundations of oblivious transfer
Christian Cachin
- The chain & sum primitive and its applications to MACs and
stream ciphers
Mariusz H. Jakubowski and Ramarathnam Venkatesan
- Quorum-based secure multi-party computation
Donald Beaver and Avishai Wool
To the EUROCRYPT '98 main page.
To the IACR home page.
eurocrypt98@hut.fi, Tuomas Aura