What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1998
Year
Venue
Title
1998
CRYPTO
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
Ronald Cramer
Victor Shoup
1998
CRYPTO
A Simplified Approach to Threshold and Proactive RSA
Tal Rabin
1998
CRYPTO
Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings
1998
CRYPTO
An Efficient Discrete Log Pseudo Random Generator
Sarvar Patel
Ganapathy S. Sundaram
1998
CRYPTO
An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm
Neal Koblitz
1998
CRYPTO
Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract)
Yonatan Aumann
Michael O. Rabin
1998
CRYPTO
Building PRFs from PRPs
Chris Hall
David Wagner
John Kelsey
Bruce Schneier
1998
CRYPTO
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
Daniel Bleichenbacher
1998
CRYPTO
Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints
Cynthia Dwork
Amit Sahai
1998
CRYPTO
Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree
Thomas Jakobson
1998
CRYPTO
Cryptanalysis of the Ajtai-Dwork Cryptosystem
Phong Q. Nguyen
Jacques Stern
1998
CRYPTO
Cryptanalysis of the Chor-Rivest Cryptosystem
Serge Vaudenay
1998
CRYPTO
Cryptanalysis of the Oil & Vinegar Signature Scheme
Aviad Kipnis
Adi Shamir
1998
CRYPTO
Cryptography and the Internet
★
Invited paper
Steven M. Bellovin
1998
CRYPTO
Differential Collisions in SHA-0
Florent Chabaud
Antoine Joux
1998
CRYPTO
Fast Digital Identity Revocation (Extended Abstract)
William Aiello
Sachin Lodha
Rafail Ostrovsky
1998
CRYPTO
Fast RSA-Type Cryptosystem Modulo p<sup>k</sup>q
Tsuyoshi Takagi
1998
CRYPTO
From Differential Cryptoanalysis to Ciphertext-Only Attacks
Alex Biryukov
Eyal Kushilevitz
1998
CRYPTO
From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract)
Moni Naor
Omer Reingold
1998
CRYPTO
Generalized Birthday Arracks on Unbalanced Feistel Networks
Charanjit S. Jutla
1998
CRYPTO
Identity Escrow
Joe Kilian
Erez Petrank
1998
CRYPTO
Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems
Mihir Bellare
Shai Halevi
Amit Sahai
Salil P. Vadhan
1998
CRYPTO
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications
Dario Catalano
Rosario Gennaro
1998
CRYPTO
On Concrete Security Treatment of Signatures Derived from Identification
Kazuo Ohta
Tatsuaki Okamoto
1998
CRYPTO
On the Existence of 3-Round Zero-Knowledge Protocols
Satoshi Hada
Toshiaki Tanaka
1998
CRYPTO
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms
Daniel V. Bailey
Christof Paar
1998
CRYPTO
Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES
Takeshi Shimoyama
Toshinobu Kaneko
1998
CRYPTO
Quantum Bit Commitment from a Physical Assumption
Louis Salvail
1998
CRYPTO
Relations Among Notions of Security for Public-Key Encryption Schemes
Mihir Bellare
Anand Desai
David Pointcheval
Phillip Rogaway
1998
CRYPTO
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers
William Aiello
Mihir Bellare
Giovanni Di Crescenzo
Ramarathnam Venkatesan
1998
CRYPTO
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
Oded Goldreich
Birgit Pfitzmann
Ronald L. Rivest
1998
CRYPTO
The Solution of McCurley's Discrete Log Challenge
Damian Weber
Thomas F. Denny
1998
CRYPTO
Threshold Traitor Tracing
Moni Naor
Benny Pinkas
1998
CRYPTO
Time-Stamping with Binary Linking Schemes
Ahto Buldas
Peeter Laud
Helger Lipmaa
Jan Willemson
1998
CRYPTO
Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract)
Matthias Fitzi
Martin Hirt
Ueli Maurer
1998
CRYPTO
Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free?
Ronald Cramer
Ivan Damgård