Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/eurocrypt/eurocrypt99.bht:"
@inproceedings{DBLP:conf/eurocrypt/BihamBS99, author = {Eli Biham and Alex Biryukov and Adi Shamir}, editor = {Jacques Stern}, title = {Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {12--23}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_2}, doi = {10.1007/3-540-48910-X\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamBS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehD99, author = {Dan Boneh and Glenn Durfee}, editor = {Jacques Stern}, title = {Cryptanalysis of {RSA} with Private Key \emph{d} Less than \emph{N}\({}^{\mbox{0.292}}\)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {1--11}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_1}, doi = {10.1007/3-540-48910-X\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CachinMS99, author = {Christian Cachin and Silvio Micali and Markus Stadler}, editor = {Jacques Stern}, title = {Computationally Private Information Retrieval with Polylogarithmic Communication}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {402--414}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_28}, doi = {10.1007/3-540-48910-X\_28}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CachinMS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CamenischM99, author = {Jan Camenisch and Markus Michels}, editor = {Jacques Stern}, title = {Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {107--122}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_8}, doi = {10.1007/3-540-48910-X\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CamenischM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiG99, author = {Ran Canetti and Shafi Goldwasser}, editor = {Jacques Stern}, title = {An Efficient \emph{Threshold} Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {90--106}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_7}, doi = {10.1007/3-540-48910-X\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiMN99, author = {Ran Canetti and Tal Malkin and Kobbi Nissim}, editor = {Jacques Stern}, title = {Efficient Communication-Storage Tradeoffs for Multicast Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {459--474}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_32}, doi = {10.1007/3-540-48910-X\_32}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiMN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CheonCP99, author = {Jung Hee Cheon and Seongtaek Chee and Choonsik Park}, editor = {Jacques Stern}, title = {S-boxes with Controllable Nonlinearity}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {286--294}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_20}, doi = {10.1007/3-540-48910-X\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CheonCP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDDHR99, author = {Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski and Martin Hirt and Tal Rabin}, editor = {Jacques Stern}, title = {Efficient Multiparty Computations Secure Against an Adaptive Adversary}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {311--326}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_22}, doi = {10.1007/3-540-48910-X\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDDHR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CrescenzoOR99, author = {Giovanni Di Crescenzo and Rafail Ostrovsky and Sivaramakrishnan Rajagopalan}, editor = {Jacques Stern}, title = {Conditional Oblivious Transfer and Timed-Release Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {74--89}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_6}, doi = {10.1007/3-540-48910-X\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CrescenzoOR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardKS99, author = {Ivan Damg{\aa}rd and Joe Kilian and Louis Salvail}, editor = {Jacques Stern}, title = {On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {56--73}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_5}, doi = {10.1007/3-540-48910-X\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardKS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisM99, author = {Yevgeniy Dodis and Silvio Micali}, editor = {Jacques Stern}, title = {Lower Bounds for Oblivious Transfer Reductions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {42--55}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_4}, doi = {10.1007/3-540-48910-X\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ErgunKK99, author = {Funda Erg{\"{u}}n and Joe Kilian and Ravi Kumar}, editor = {Jacques Stern}, title = {A Note on the Limits of Collusion-Resistant Watermarks}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {140--149}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_10}, doi = {10.1007/3-540-48910-X\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ErgunKK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Fischlin99, author = {Marc Fischlin}, editor = {Jacques Stern}, title = {Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {432--445}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_30}, doi = {10.1007/3-540-48910-X\_30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Fischlin99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GennaroHR99, author = {Rosario Gennaro and Shai Halevi and Tal Rabin}, editor = {Jacques Stern}, title = {Secure Hash-and-Sign Signatures Without the Random Oracle}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {123--139}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_9}, doi = {10.1007/3-540-48910-X\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GennaroHR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GennaroJKR99, author = {Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin}, editor = {Jacques Stern}, title = {Secure Distributed Key Generation for Discrete-Log Based Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {295--310}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_21}, doi = {10.1007/3-540-48910-X\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GennaroJKR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HarasawaSSI99, author = {Ryuichi Harasawa and Junji Shikata and Joe Suzuki and Hideki Imai}, editor = {Jacques Stern}, title = {Comparing the {MOV} and {FR} Reductions in Elliptic Curve Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {190--205}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_14}, doi = {10.1007/3-540-48910-X\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HarasawaSSI99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HawkesO99, author = {Philip Hawkes and Luke O'Connor}, editor = {Jacques Stern}, title = {{XOR} and Non-XOR Differential Probabilities}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {272--285}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_19}, doi = {10.1007/3-540-48910-X\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HawkesO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JohanssonJ99, author = {Thomas Johansson and Fredrik J{\"{o}}nsson}, editor = {Jacques Stern}, title = {Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {347--362}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_24}, doi = {10.1007/3-540-48910-X\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JohanssonJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KipnisPG99, author = {Aviad Kipnis and Jacques Patarin and Louis Goubin}, editor = {Jacques Stern}, title = {Unbalanced Oil and Vinegar Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {206--222}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_15}, doi = {10.1007/3-540-48910-X\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KipnisPG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KnudsenM99, author = {Lars R. Knudsen and Willi Meier}, editor = {Jacques Stern}, title = {Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {363--374}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_25}, doi = {10.1007/3-540-48910-X\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KnudsenM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KobayashiMKH99, author = {Tetsutaro Kobayashi and Hikaru Morita and Kunio Kobayashi and Fumitaka Hoshino}, editor = {Jacques Stern}, title = {Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {176--189}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_13}, doi = {10.1007/3-540-48910-X\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KobayashiMKH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MizukiSN99, author = {Takaaki Mizuki and Hiroki Shizuya and Takao Nishizeki}, editor = {Jacques Stern}, title = {Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {389--401}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_27}, doi = {10.1007/3-540-48910-X\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/MizukiSN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaorPR99, author = {Moni Naor and Benny Pinkas and Omer Reingold}, editor = {Jacques Stern}, title = {Distributed Pseudo-random Functions and KDCs}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {327--346}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_23}, doi = {10.1007/3-540-48910-X\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaorPR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NevelsteenP99, author = {Wim Nevelsteen and Bart Preneel}, editor = {Jacques Stern}, title = {Software Performance of Universal Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {24--41}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_3}, doi = {10.1007/3-540-48910-X\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NevelsteenP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OConnor99, author = {Luke O'Connor}, editor = {Jacques Stern}, title = {An Analysis of Exponentiation Based on Formal Languages}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {375--388}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_26}, doi = {10.1007/3-540-48910-X\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OConnor99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Paillier99, author = {Pascal Paillier}, editor = {Jacques Stern}, title = {Public-Key Cryptosystems Based on Composite Degree Residuosity Classes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {223--238}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_16}, doi = {10.1007/3-540-48910-X\_16}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Paillier99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PfitzmannS99, author = {Birgit Pfitzmann and Ahmad{-}Reza Sadeghi}, editor = {Jacques Stern}, title = {Coin-Based Anonymous Fingerprinting}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {150--164}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_11}, doi = {10.1007/3-540-48910-X\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PfitzmannS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pointcheval99, author = {David Pointcheval}, editor = {Jacques Stern}, title = {New Public Key Cryptosystems Based on the Dependent-RSA Problems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {239--254}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_17}, doi = {10.1007/3-540-48910-X\_17}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pointcheval99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RichardsonK99, author = {Ransom Richardson and Joe Kilian}, editor = {Jacques Stern}, title = {On the Concurrent Composition of Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {415--431}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_29}, doi = {10.1007/3-540-48910-X\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RichardsonK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Smart99, author = {Nigel P. Smart}, editor = {Jacques Stern}, title = {On the Performance of Hyperelliptic Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {165--175}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_12}, doi = {10.1007/3-540-48910-X\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Smart99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Vaudenay99, author = {Serge Vaudenay}, editor = {Jacques Stern}, title = {Resistance Against General Iterated Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {255--271}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_18}, doi = {10.1007/3-540-48910-X\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Vaudenay99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangD99, author = {Yongge Wang and Yvo Desmedt}, editor = {Jacques Stern}, title = {Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {446--458}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_31}, doi = {10.1007/3-540-48910-X\_31}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/99, editor = {Jacques Stern}, title = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X}, doi = {10.1007/3-540-48910-X}, isbn = {3-540-65889-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.