default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr1998.bht:"
@article{DBLP:journals/iacr/AielloBCV98, author = {William Aiello and Mihir Bellare and Giovanni Di Crescenzo and Ramarathnam Venkatesan}, title = {Security amplification by composition: The case of doubly-iterated, ideal ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {1998}, url = {http://eprint.iacr.org/1998/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AielloBCV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareCK98, author = {Mihir Bellare and Ran Canetti and Hugo Krawczyk}, title = {A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {1998}, url = {http://eprint.iacr.org/1998/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareCK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareDPR98, author = {Mihir Bellare and Anand Desai and David Pointcheval and Phillip Rogaway}, title = {Relations among Notions of Security for Public-Key Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {1998}, url = {http://eprint.iacr.org/1998/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareDPR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareGR98, author = {Mihir Bellare and Juan A. Garay and Tal Rabin}, title = {Fast Batch Verification for Modular Exponentiation and Digital Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {1998}, url = {http://eprint.iacr.org/1998/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareGR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareHSV98, author = {Mihir Bellare and Shai Halevi and Amit Sahai and Salil P. Vadhan}, title = {Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {1998}, url = {http://eprint.iacr.org/1998/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareHSV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bleumer98, author = {Gerrit Bleumer}, title = {On Protocol Divertibility}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {1998}, url = {http://eprint.iacr.org/1998/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bleumer98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Canetti98, author = {Ran Canetti}, title = {Security and Composition of Multi-party Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {1998}, url = {http://eprint.iacr.org/1998/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Canetti98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiGH98, author = {Ran Canetti and Oded Goldreich and Shai Halevi}, title = {The Random Oracle Methodology, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {1998}, url = {http://eprint.iacr.org/1998/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiGH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiHH98, author = {Ran Canetti and Shai Halevi and Amir Herzberg}, title = {Maintaining Authenticated Communication in the Presence of Break-ins}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {1998}, url = {http://eprint.iacr.org/1998/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiHH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiKOR98, author = {Ran Canetti and Eyal Kushilevitz and Rafail Ostrovsky and Adi Ros{\'{e}}n}, title = {Randomness versus Fault-Tolerance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {1998}, url = {http://eprint.iacr.org/1998/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiKOR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChauL98, author = {Hoi Fung Chau and Hoi{-}Kwong Lo}, title = {Making An Empty Promise With {A} Quantum Computer (Or, {A} Brief Review on the Impossibility of Quantum Bit Commitment)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {1998}, url = {http://eprint.iacr.org/1998/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChauL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChorGN98, author = {Benny Chor and Niv Gilboa and Moni Naor}, title = {Private Information Retrieval by Keywords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {1998}, url = {http://eprint.iacr.org/1998/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChorGN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerS98, author = {Ronald Cramer and Victor Shoup}, title = {A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {1998}, url = {http://eprint.iacr.org/1998/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrescenzoIO98, author = {Giovanni Di Crescenzo and Yuval Ishai and Rafail Ostrovsky}, title = {Universal Service Providers for Database Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {1998}, url = {http://eprint.iacr.org/1998/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrescenzoIO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayGJR98, author = {Juan A. Garay and Rosario Gennaro and Charanjit S. Jutla and Tal Rabin}, title = {Secure Distributed Storage and Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {1998}, url = {http://eprint.iacr.org/1998/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayGJR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroMR98, author = {Rosario Gennaro and Daniele Micciancio and Tal Rabin}, title = {An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {1998}, url = {http://eprint.iacr.org/1998/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroMR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GertnerGM98, author = {Yael Gertner and Shafi Goldwasser and Tal Malkin}, title = {A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic {PIR} Avoiding Data Replication)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {1998}, url = {http://eprint.iacr.org/1998/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GertnerGM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldreichG98, author = {Oded Goldreich and Shafi Goldwasser}, title = {On the possibility of basing Cryptography on the assumption that {P} {\(\not =\)} {NP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {1998}, url = {http://eprint.iacr.org/1998/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldreichG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldreichV98, author = {Oded Goldreich and Salil P. Vadhan}, title = {Comparing Entropies in Statistical Zero-Knowledge with Applications to the Structure of {SZK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {1998}, url = {http://eprint.iacr.org/1998/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldreichV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviM98, author = {Shai Halevi and Silvio Micali}, title = {More on Proofs of Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {1998}, url = {http://eprint.iacr.org/1998/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrawczykR98, author = {Hugo Krawczyk and Tal Rabin}, title = {Chameleon Hashing and Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {1998}, url = {http://eprint.iacr.org/1998/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrawczykR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lo98, author = {Hoi{-}Kwong Lo}, title = {Insecurity of Quantum Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {1998}, url = {http://eprint.iacr.org/1998/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lo98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pliam98, author = {John O. Pliam}, title = {The Disparity between Work and Entropy in Cryptology}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {1998}, url = {http://eprint.iacr.org/1998/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pliam98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SantisCGP98, author = {Alfredo De Santis and Giovanni Di Crescenzo and Oded Goldreich and Giuseppe Persiano}, title = {The Graph Clustering Problem has a Perfect Zero-Knowledge Proof}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {1998}, url = {http://eprint.iacr.org/1998/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SantisCGP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schnorr98, author = {Claus{-}Peter Schnorr}, title = {Almost All Discrete Log Bits Are Simultaneously Secure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {1998}, url = {http://eprint.iacr.org/1998/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schnorr98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LoC98, title = {Quantum Computers Render Quantum Key Distribution Unconditionally Secure Over Arbitrarily Long Distances}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {1998}, note = {Withdrawn.}, url = {http://eprint.iacr.org/1998/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LoC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.