ISBN: 3-540-66347-9
TITLE: Advances in Cryptology - CRYPTO '99
AUTHOR: Wiener, Michael (Ed.)
TOC:

Public-Key Cryptanalysis I
On the Security of RSA Padding 1
Jean-Sbastien Coron, David Naccache, Julien P. Stern
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization 19
Aviad Kipnis, Adi Shamir
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications 31
Phong Nguyen, Jacques Stern
Invited Lecture
Information-Theoretic Cryptography 47
Ueli Maurer
Secure Communication and Computation
Information Theoretically Secure Communication in the Limited Storage Space Model 65
Yonatan Aumann, Michael O. Rabin
The All-or-Nothing Nature of Two-Party Secure Computation 80
Amos Beimel, Tal Malkin, Silvio Micali
Distributed Cryptography
Adaptive Security for Threshold Cryptosystems 98
Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Two Party RSA Key Generation 116
Niv Gilboa
Robust Distributed Multiplication without Interaction 130
Masayuki Abe
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting 148
Berry Schoenmakers
Secret-Key Cryptography
Truncated Differentials and Skipjack 165
Lars R. Knudsen, M.J.B. Robshaw, David Wagner
Fast Correlation Attacks Based on Turbo Code Techniques 181
Thomas Johansson, Fredrik Jnsson
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality 198
Subhamoy Maitra, Palash Sarkar
Message Authentication Codes
UMAC: Fast and Secure Message Authentication 216
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway
Square Hash: Fast Message Authentication via Optimized Universal Hash Functions 234
Mark Etzel, Sarvar Patel, Zulfikar Ramzan
Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions 252
Jee Hea An, Mihir Bellare
Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier 270
Mihir Bellare, Oded Goldreich, Hugo Krawczyk
Public-Key Cryptanalysis II
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97 288
Phong Nguyen
Weakness in Quaternion Signatures 305
Don Coppersmith
Cryptanalysis of "2R" Schemes 315
Ding-Feng Ye, Kwok-Yan Lam, Zong-Duo Dai
Factoring N = prq for Large r 326
Dan Boneh, Glenn Durfee, Nick Howgrave-Graham
Traitor Tracing
An Efficient Public Key Traitor Tracing Scheme 338
Dan Boneh, Matthew Franklin
Dynamic Traitor Tracing 354
Amos Fiat, Tamir Tassa
Efficient Methods for Integrating Traceability and Broadcast Encryption 372
Eli Gafni, Jessica Staddon, Yiqun Lisa Yin
Differential Power Analysis
Differential Power Analysis 388
Paul Kocher, Joshua Jaffe, Benjamin Jun
Towards Sound Approaches to Counteract Power-Analysis Attacks 398
Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi
Signature Schemes
Separability and Efficiency for Generic Group Signature Schemes 413
Jan Camenisch, Markus Michels
A Forward-Secure Digital Signature Scheme 431
Mihir Bellare, Sara K. Miner
Abuse-Free Optimistic Contract Signing 449
Juan A. Garay, Markus Jakobsson, Philip MacKenzie
Zero Knowledge
Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK 467
Oded Goldreich, Amit Sahai, Salil Vadhan
On Concurrent Zero-Knowledge with Pre-processing 485
Giovanni Di Crescenzo, Rafail Ostrovsky
Asymmetric Encryption
On the Security Properties of OAEP as an All-or-Nothing Transform 503
Victor Boyko
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization 519
Mihir Bellare, Amit Sahai
Secure Integration of Asymmetric and Symmetric Encryption Schemes 537
Eiichiro Fujisaki, Tatsuaki Okamoto
Electronic Cash
Auditable, Anonymous Electronic Cash 555
Tomas Sander, Amnon Ta-Shma
Protocols and Broadcasting
Oblivious Transfer with Adaptive Queries 573
Moni Naor, Benny Pinkas
Compressing Cryptographic Resources 591
Niv Gilboa, Yuval Ishai
Coding Constructions for Blacklisting Problems without Computational Assumptions 609
Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes 624
Radha Poovendran, John S. Baras
Author Index 639
END
