Sciweavers

CRYPTO
1999
Springer
107views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
Differential Power Analysis
Paul C. Kocher, Joshua Jaffe, Benjamin Jun
CRYPTO
1999
Springer
95views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
Abuse-Free Optimistic Contract Signing
Juan A. Garay, Markus Jakobsson, Philip D. MacKenz...
CRYPTO
1999
Springer
77views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
Efficient Methods for Integrating Traceability and Broadcast Encryption
Eli Gafni, Jessica Staddon, Yiqun Lisa Yin
CRYPTO
1999
Springer
98views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
On Concurrent Zero-Knowledge with Pre-processing
Giovanni Di Crescenzo, Rafail Ostrovsky
CRYPTO
1999
Springer
66views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
On the Security of RSA Padding
Jean-Sébastien Coron, David Naccache, Julie...
CRYPTO
1999
Springer
113views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
Factoring N = prq for Large r
Dan Boneh, Glenn Durfee, Nick Howgrave-Graham
CRYPTO
1999
Springer
103views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
Information Theoretically Secure Communication in the Limited Storage Space Model
Abstract. We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-s...
Yonatan Aumann, Michael O. Rabin
CRYPTO
1999
Springer
87views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
We prove the equivalence of two definitions of non-malleable encryption appearing in the literature— the original one of Dolev, Dwork and Naor and the later one of Bellare, Desa...
Mihir Bellare, Amit Sahai
CRYPTO
1999
Springer
72views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
A Forward-Secure Digital Signature Scheme
Mihir Bellare, Sara K. Miner
CRYPTO
1999
Springer
87views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier
Mihir Bellare, Oded Goldreich, Hugo Krawczyk