Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/crypto/crypto2000.bht:"
@inproceedings{DBLP:conf/crypto/Abadi00, author = {Mart{\'{\i}}n Abadi}, editor = {Mihir Bellare}, title = {Taming the Adversary}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {353--358}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_22}, doi = {10.1007/3-540-44598-6\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Abadi00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbeO00, author = {Masayuki Abe and Tatsuaki Okamoto}, editor = {Mihir Bellare}, title = {Provably Secure Partially Blind Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {271--286}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_17}, doi = {10.1007/3-540-44598-6\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbeO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AtenieseCJT00, author = {Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik}, editor = {Mihir Bellare}, title = {A Practical and Provably Secure Coalition-Resistant Group Signature Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {255--270}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_16}, doi = {10.1007/3-540-44598-6\_16}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AtenieseCJT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeimelIM00, author = {Amos Beimel and Yuval Ishai and Tal Malkin}, editor = {Mihir Bellare}, title = {Reducing the Servers Computation in Private Information Retrieval: {PIR} with Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {55--73}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_4}, doi = {10.1007/3-540-44598-6\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeimelIM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BiehlMM00, author = {Ingrid Biehl and Bernd Meyer and Volker M{\"{u}}ller}, editor = {Mihir Bellare}, title = {Differential Fault Attacks on Elliptic Curve Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {131--146}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_8}, doi = {10.1007/3-540-44598-6\_8}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BiehlMM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BierbrauerS00, author = {J{\"{u}}rgen Bierbrauer and Holger Schellwat}, editor = {Mihir Bellare}, title = {Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {533--544}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_33}, doi = {10.1007/3-540-44598-6\_33}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BierbrauerS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlackR00, author = {John Black and Phillip Rogaway}, editor = {Mihir Bellare}, title = {{CBC} MACs for Arbitrary-Length Messages: The Three-Key Constructions}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {197--215}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_12}, doi = {10.1007/3-540-44598-6\_12}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BlackR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehN00, author = {Dan Boneh and Moni Naor}, editor = {Mihir Bellare}, title = {Timed Commitments}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {236--254}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_15}, doi = {10.1007/3-540-44598-6\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CachinC00, author = {Christian Cachin and Jan Camenisch}, editor = {Mihir Bellare}, title = {Optimistic Fair Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {93--111}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_6}, doi = {10.1007/3-540-44598-6\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CachinC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoppersmithKM00, author = {Don Coppersmith and Lars R. Knudsen and Chris J. Mitchell}, editor = {Mihir Bellare}, title = {Key Recovery and Forgery Attacks on the MacDES {MAC} Algorithm}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {184--196}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_11}, doi = {10.1007/3-540-44598-6\_11}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoppersmithKM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Coron00, author = {Jean{-}S{\'{e}}bastien Coron}, editor = {Mihir Bellare}, title = {On the Exact Security of Full Domain Hash}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {229--235}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_14}, doi = {10.1007/3-540-44598-6\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Coron00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardN00, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, editor = {Mihir Bellare}, title = {Improved Non-committing Encryption Schemes Based on a General Complexity Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {432--450}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_27}, doi = {10.1007/3-540-44598-6\_27}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Desai00, author = {Anand Desai}, editor = {Mihir Bellare}, title = {The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {359--375}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_23}, doi = {10.1007/3-540-44598-6\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Desai00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Desai00a, author = {Anand Desai}, editor = {Mihir Bellare}, title = {New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {394--412}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_25}, doi = {10.1007/3-540-44598-6\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Desai00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisHR00, author = {Yevgeniy Dodis and Shai Halevi and Tal Rabin}, editor = {Mihir Bellare}, title = {A Cryptographic Solution to a Game Theoretic Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {112--130}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_7}, doi = {10.1007/3-540-44598-6\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisHR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisM00, author = {Yevgeniy Dodis and Silvio Micali}, editor = {Mihir Bellare}, title = {Parallel Reducibility for Information-Theoretically Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {74--92}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_5}, doi = {10.1007/3-540-44598-6\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischlinF00, author = {Marc Fischlin and Roger Fischlin}, editor = {Mihir Bellare}, title = {Efficient Non-malleable Commitment Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {413--431}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_26}, doi = {10.1007/3-540-44598-6\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischlinF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GaraySW00, author = {Juan A. Garay and Jessica Staddon and Avishai Wool}, editor = {Mihir Bellare}, title = {Long-Lived Broadcast Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {333--352}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_21}, doi = {10.1007/3-540-44598-6\_21}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GaraySW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Gennaro00, author = {Rosario Gennaro}, editor = {Mihir Bellare}, title = {An Improved Pseudo-random Generator Based on Discrete Log}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {469--481}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_29}, doi = {10.1007/3-540-44598-6\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Gennaro00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GisinW00, author = {Nicolas Gisin and Stefan Wolf}, editor = {Mihir Bellare}, title = {Linking Classical and Quantum Key Agreement: Is There "Bound Information"?}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {482--500}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_30}, doi = {10.1007/3-540-44598-6\_30}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GisinW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JaulmesJ00, author = {{\'{E}}liane Jaulmes and Antoine Joux}, editor = {Mihir Bellare}, title = {A Chosen-Ciphertext Attack against {NTRU}}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {20--35}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_2}, doi = {10.1007/3-540-44598-6\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JaulmesJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JohanssonJ00, author = {Thomas Johansson and Fredrik J{\"{o}}nsson}, editor = {Mihir Bellare}, title = {Fast Correlation Attacks through Reconstruction of Linear Polynomials}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {300--315}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_19}, doi = {10.1007/3-540-44598-6\_19}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/JohanssonJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KoLCHKP00, author = {Ki Hyoung Ko and Sangjin Lee and Jung Hee Cheon and Jae Woo Han and Ju{-}Sung Kang and Choonsik Park}, editor = {Mihir Bellare}, title = {New Public-Key Cryptosystem Using Braid Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {166--183}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_10}, doi = {10.1007/3-540-44598-6\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KoLCHKP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LenstraV00, author = {Arjen K. Lenstra and Eric R. Verheul}, editor = {Mihir Bellare}, title = {The {XTR} Public Key System}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {1--19}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_1}, doi = {10.1007/3-540-44598-6\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LenstraV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LindellP00, author = {Yehuda Lindell and Benny Pinkas}, editor = {Mihir Bellare}, title = {Privacy Preserving Data Mining}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {36--54}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_3}, doi = {10.1007/3-540-44598-6\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LindellP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoTU00, author = {Tatsuaki Okamoto and Keisuke Tanaka and Shigenori Uchiyama}, editor = {Mihir Bellare}, title = {Quantum Public-Key Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {147--165}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_9}, doi = {10.1007/3-540-44598-6\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoTU00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RamzanR00, author = {Zulfikar Ramzan and Leonid Reyzin}, editor = {Mihir Bellare}, title = {On the Round Security of Symmetric-Key Cryptographic Primitives}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {376--393}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_24}, doi = {10.1007/3-540-44598-6\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RamzanR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Rosen00, author = {Alon Rosen}, editor = {Mihir Bellare}, title = {A Note on the Round-Complexity of Concurrent Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {451--468}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_28}, doi = {10.1007/3-540-44598-6\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Rosen00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Safavi-NainiW00, author = {Reihaneh Safavi{-}Naini and Yejing Wang}, editor = {Mihir Bellare}, title = {Sequential Traitor Tracing}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {316--332}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_20}, doi = {10.1007/3-540-44598-6\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Safavi-NainiW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SarkarM00, author = {Palash Sarkar and Subhamoy Maitra}, editor = {Mihir Bellare}, title = {Nonlinearity Bounds and Constructions of Resilient Boolean Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {515--532}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_32}, doi = {10.1007/3-540-44598-6\_32}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SarkarM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Semanko00, author = {Michael Semanko}, editor = {Mihir Bellare}, title = {L-collision Attacks against Randomized MACs}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {216--228}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_13}, doi = {10.1007/3-540-44598-6\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Semanko00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SteinwandtGGB00, author = {Rainer Steinwandt and Markus Grassl and Willi Geiselmann and Thomas Beth}, editor = {Mihir Bellare}, title = {Weaknesses in the SL\({}_{\mbox{2}}\)(IF\({}_{\mbox{s\({}^{\mbox{2}}\)}}\)) Hashing Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {287--299}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_18}, doi = {10.1007/3-540-44598-6\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SteinwandtGGB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ZhangC00, author = {Muxiang Zhang and Agnes Hui Chan}, editor = {Mihir Bellare}, title = {Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {501--514}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_31}, doi = {10.1007/3-540-44598-6\_31}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ZhangC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2000, editor = {Mihir Bellare}, title = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6}, doi = {10.1007/3-540-44598-6}, isbn = {3-540-67907-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.