What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1999
Year
Venue
Title
1999
CRYPTO
A Forward-Secure Digital Signature Scheme
Mihir Bellare
Sara K. Miner
1999
CRYPTO
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
Berry Schoenmakers
1999
CRYPTO
Abuse-Free Optimistic Contract Signing
Juan A. Garay
Markus Jakobsson
Philip D. MacKenzie
1999
CRYPTO
Adaptive Security for Threshold Cryptosystems
Ran Canetti
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1999
CRYPTO
Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings
1999
CRYPTO
An Efficient Public Key Traitor Tracing Scheme
Dan Boneh
Matthew K. Franklin
1999
CRYPTO
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Radha Poovendran
John S. Baras
1999
CRYPTO
Auditable, Anonymous Electronic Cash Extended Abstract
Tomas Sander
Amnon Ta-Shma
1999
CRYPTO
Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK
Oded Goldreich
Amit Sahai
Salil P. Vadhan
1999
CRYPTO
Coding Constructions for Blacklisting Problems without Computational Assumptions
Ravi Kumar
Sridhar Rajagopalan
Amit Sahai
1999
CRYPTO
Compressing Cryptographic Resources
Niv Gilboa
Yuval Ishai
1999
CRYPTO
Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions
Jee Hea An
Mihir Bellare
1999
CRYPTO
Cryptanalysis of ``2 R'' Schemes
Dingfeng Ye
Kwok-Yan Lam
Zong-Duo Dai
1999
CRYPTO
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97
Phong Q. Nguyen
1999
CRYPTO
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization
Aviad Kipnis
Adi Shamir
1999
CRYPTO
Differential Power Analysis
Paul C. Kocher
Joshua Jaffe
Benjamin Jun
1999
CRYPTO
Dynamic Traitor Training
Amos Fiat
Tamir Tassa
1999
CRYPTO
Efficient Methods for Integrating Traceability and Broadcast Encryption
Eli Gafni
Jessica Staddon
Yiqun Lisa Yin
1999
CRYPTO
Factoring N = p<sup>r</sup>q for Large r
Dan Boneh
Glenn Durfee
Nick Howgrave-Graham
1999
CRYPTO
Fast Correlation Attacks Based on Turbo Code Techniques
Thomas Johansson
Fredrik Jönsson
1999
CRYPTO
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality
Subhamoy Maitra
Palash Sarkar
1999
CRYPTO
Information Theoretically Secure Communication in the Limited Storage Space Model
Yonatan Aumann
Michael O. Rabin
1999
CRYPTO
Information-Theoretic Cryptography
★
Invited paper
Ueli Maurer
1999
CRYPTO
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
Mihir Bellare
Amit Sahai
1999
CRYPTO
Oblivious Transfer with Adaptive Queries
Moni Naor
Benny Pinkas
1999
CRYPTO
On Concurrent Zero-Knowledge with Pre-processing
Giovanni Di Crescenzo
Rafail Ostrovsky
1999
CRYPTO
On the Security of RSA Padding
Jean-Sébastien Coron
David Naccache
Julien P. Stern
1999
CRYPTO
On the Security Properties of OAEP as an All-or-Nothing Transform
Victor Boyko
1999
CRYPTO
Robust Distributed Multiplicaton with out Interaction
Masayuki Abe
1999
CRYPTO
Secure Integration of Asymmetric and Symmetric Encryption Schemes
Eiichiro Fujisaki
Tatsuaki Okamoto
1999
CRYPTO
Separability and Efficiency for Generic Group Signature Schemes
Jan Camenisch
Markus Michels
1999
CRYPTO
SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions
Mark Etzel
Sarvar Patel
Zulfikar Ramzan
1999
CRYPTO
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier
Mihir Bellare
Oded Goldreich
Hugo Krawczyk
1999
CRYPTO
The All-or-Nothing Nature of Two-Party Secure Computation
Amos Beimel
Tal Malkin
Silvio Micali
1999
CRYPTO
The Evolution of Public-Key Cryptography
★
Invited talk
Martin E. Hellman
1999
CRYPTO
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications
Phong Q. Nguyen
Jacques Stern
1999
CRYPTO
Towards Sound Approaches to Counteract Power-Analysis Attacks
Suresh Chari
Charanjit S. Jutla
Josyula R. Rao
Pankaj Rohatgi
1999
CRYPTO
Truncated Differentials and Skipjack
Lars R. Knudsen
Matthew J. B. Robshaw
David Wagner
1999
CRYPTO
Two Party RSA Key Generation
Niv Gilboa
1999
CRYPTO
UMAC: Fast and Secure Message Authentication
John Black
Shai Halevi
Hugo Krawczyk
Ted Krovetz
Phillip Rogaway
1999
CRYPTO
Weakness in Quaternion Signatures
Don Coppersmith