Search dblp for Publications

export results for "toc:db/journals/iacr/iacr1998.bht:"

 download as .bib file

@article{DBLP:journals/iacr/AielloBCV98,
  author       = {William Aiello and
                  Mihir Bellare and
                  Giovanni Di Crescenzo and
                  Ramarathnam Venkatesan},
  title        = {Security amplification by composition: The case of doubly-iterated,
                  ideal ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AielloBCV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareCK98,
  author       = {Mihir Bellare and
                  Ran Canetti and
                  Hugo Krawczyk},
  title        = {A Modular Approach to the Design and Analysis of Authentication and
                  Key Exchange Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareCK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareDPR98,
  author       = {Mihir Bellare and
                  Anand Desai and
                  David Pointcheval and
                  Phillip Rogaway},
  title        = {Relations among Notions of Security for Public-Key Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareDPR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareGR98,
  author       = {Mihir Bellare and
                  Juan A. Garay and
                  Tal Rabin},
  title        = {Fast Batch Verification for Modular Exponentiation and Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareGR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareHSV98,
  author       = {Mihir Bellare and
                  Shai Halevi and
                  Amit Sahai and
                  Salil P. Vadhan},
  title        = {Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareHSV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bleumer98,
  author       = {Gerrit Bleumer},
  title        = {On Protocol Divertibility},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bleumer98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Canetti98,
  author       = {Ran Canetti},
  title        = {Security and Composition of Multi-party Cryptographic Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Canetti98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiGH98,
  author       = {Ran Canetti and
                  Oded Goldreich and
                  Shai Halevi},
  title        = {The Random Oracle Methodology, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiGH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiHH98,
  author       = {Ran Canetti and
                  Shai Halevi and
                  Amir Herzberg},
  title        = {Maintaining Authenticated Communication in the Presence of Break-ins},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiHH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiKOR98,
  author       = {Ran Canetti and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Adi Ros{\'{e}}n},
  title        = {Randomness versus Fault-Tolerance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiKOR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChauL98,
  author       = {Hoi Fung Chau and
                  Hoi{-}Kwong Lo},
  title        = {Making An Empty Promise With {A} Quantum Computer (Or, {A} Brief Review
                  on the Impossibility of Quantum Bit Commitment)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChauL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChorGN98,
  author       = {Benny Chor and
                  Niv Gilboa and
                  Moni Naor},
  title        = {Private Information Retrieval by Keywords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChorGN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerS98,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {A Practical Public Key Cryptosystem Provably Secure against Adaptive
                  Chosen Ciphertext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrescenzoIO98,
  author       = {Giovanni Di Crescenzo and
                  Yuval Ishai and
                  Rafail Ostrovsky},
  title        = {Universal Service Providers for Database Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrescenzoIO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayGJR98,
  author       = {Juan A. Garay and
                  Rosario Gennaro and
                  Charanjit S. Jutla and
                  Tal Rabin},
  title        = {Secure Distributed Storage and Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayGJR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroMR98,
  author       = {Rosario Gennaro and
                  Daniele Micciancio and
                  Tal Rabin},
  title        = {An Efficient Non-Interactive Statistical Zero-Knowledge Proof System
                  for Quasi-Safe Prime Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroMR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GertnerGM98,
  author       = {Yael Gertner and
                  Shafi Goldwasser and
                  Tal Malkin},
  title        = {A Random Server Model for Private Information Retrieval (or How to
                  Achieve Information Theoretic {PIR} Avoiding Data Replication)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GertnerGM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldreichG98,
  author       = {Oded Goldreich and
                  Shafi Goldwasser},
  title        = {On the possibility of basing Cryptography on the assumption that {P}
                  {\(\not =\)} {NP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldreichG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldreichV98,
  author       = {Oded Goldreich and
                  Salil P. Vadhan},
  title        = {Comparing Entropies in Statistical Zero-Knowledge with Applications
                  to the Structure of {SZK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldreichV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviM98,
  author       = {Shai Halevi and
                  Silvio Micali},
  title        = {More on Proofs of Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrawczykR98,
  author       = {Hugo Krawczyk and
                  Tal Rabin},
  title        = {Chameleon Hashing and Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrawczykR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lo98,
  author       = {Hoi{-}Kwong Lo},
  title        = {Insecurity of Quantum Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lo98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pliam98,
  author       = {John O. Pliam},
  title        = {The Disparity between Work and Entropy in Cryptology},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pliam98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SantisCGP98,
  author       = {Alfredo De Santis and
                  Giovanni Di Crescenzo and
                  Oded Goldreich and
                  Giuseppe Persiano},
  title        = {The Graph Clustering Problem has a Perfect Zero-Knowledge Proof},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SantisCGP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schnorr98,
  author       = {Claus{-}Peter Schnorr},
  title        = {Almost All Discrete Log Bits Are Simultaneously Secure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schnorr98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LoC98,
  title        = {Quantum Computers Render Quantum Key Distribution Unconditionally
                  Secure Over Arbitrarily Long Distances},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {1998},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/1998/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LoC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}