What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1997
Year
Venue
Title
1997
CRYPTO
"Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case
Mihir Bellare
Shafi Goldwasser
Daniele Micciancio
1997
CRYPTO
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp
Chae Hoon Lim
Pil Joong Lee
1997
CRYPTO
A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy
Jean-François Misarsky
1997
CRYPTO
A One Way Function Based on Ideal Arithmetic in Number Fields
Johannes Buchmann
Sachar Paulus
1997
CRYPTO
Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings
1997
CRYPTO
An Improved Algorithm for Arithmetic on a Family of Elliptic Curves
Jerome A. Solinas
1997
CRYPTO
Collision-Resistant Hashing: Towards Making UOWHFs Practical
Mihir Bellare
Phillip Rogaway
1997
CRYPTO
Cryptoanalysis of the Cellular Encryption Algorithm
David Wagner
Bruce Schneier
John Kelsey
1997
CRYPTO
Deniable Encryption
Ran Canetti
Cynthia Dwork
Moni Naor
Rafail Ostrovsky
1997
CRYPTO
Differential Fault Analysis of Secret Key Cryptosystems
Eli Biham
Adi Shamir
1997
CRYPTO
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)
Yuliang Zheng
1997
CRYPTO
Edit Distance Correlation Attack on the Alternating Step Generator
Jovan Dj. Golic
Renato Menicocci
1997
CRYPTO
Efficient Algorithms for Elliptic Curve Cryptosystems
Jorge Guajardo
Christof Paar
1997
CRYPTO
Efficient Anonymous Multicast and Reception (Extended Abstract)
Shlomi Dolev
Rafail Ostrovsky
1997
CRYPTO
Efficient Generation of Shared RSA Keys (Extended Abstract)
Dan Boneh
Matthew K. Franklin
1997
CRYPTO
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
Jan Camenisch
Markus Stadler
1997
CRYPTO
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem
Oded Goldreich
Shafi Goldwasser
Shai Halevi
1997
CRYPTO
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
Thomas A. Berson
1997
CRYPTO
Fast and Secure Hashing Based on Codes
Lars R. Knudsen
Bart Preneel
1997
CRYPTO
Fast RSA-Type Cryptosystems Using N-Adic Expansion
Tsuyoshi Takagi
1997
CRYPTO
How to Sign Digital Streams
Rosario Gennaro
Pankaj Rohatgi
1997
CRYPTO
Keeping the SZK-Verifier Honest Unconditionally
Giovanni Di Crescenzo
Tatsuaki Okamoto
Moti Yung
1997
CRYPTO
Merkle-Hellman Revisited: A Cryptoanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations
Phong Q. Nguyen
Jacques Stern
1997
CRYPTO
On the Foundations of Modern Cryptography
★
Invited paper
Oded Goldreich
1997
CRYPTO
On the Security of the KMOV Public Key Cryptosystem
Daniel Bleichenbacher
1997
CRYPTO
Plug and Play Encryption
Donald Beaver
1997
CRYPTO
Privacy Amplification Secure Against Active Adversaries
Ueli Maurer
Stefan Wolf
1997
CRYPTO
Proactive RSA
Yair Frankel
Peter Gemmell
Philip D. MacKenzie
Moti Yung
1997
CRYPTO
Public-Key Cryptosystems from Lattice Reduction Problems
Oded Goldreich
Shafi Goldwasser
Shai Halevi
1997
CRYPTO
Quantum Information Processing: The Good, the Bad and the Ugly
★
Invited paper
Gilles Brassard
1997
CRYPTO
RSA-Based Undeniable Signatures
Rosario Gennaro
Hugo Krawczyk
Tal Rabin
1997
CRYPTO
Security of Blind Digital Signatures (Extended Abstract)
Ari Juels
Michael Luby
Rafail Ostrovsky
1997
CRYPTO
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
Eiichiro Fujisaki
Tatsuaki Okamoto
1997
CRYPTO
The Complexity of Computing Hard Core Predicates
Mikael Goldmann
Mats Näslund
1997
CRYPTO
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems
Adam Young
Moti Yung
1997
CRYPTO
Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information
Ran Canetti
1997
CRYPTO
Unconditional Security Against Memory-Bounded Adversaries
Christian Cachin
Ueli Maurer
1997
CRYPTO
Visual Authentication and Identification
Moni Naor
Benny Pinkas