Cryptographers' World
 

EUROCRYPT 2000


[Sort by page number] [Sort by citations count]

 
Bart Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding. Springer, 2000. ISBN 3-540-67517-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Stefania Cavallar,  Bruce Dodson,  Arjen K. Lenstra,  Walter M. Lioen,  Peter L. Montgomery,  Brian Murphy,  Herman te Riele,  Karen Aardal,  Jeff Gilchrist,  GĂ©rard Guillerm,  Paul C. Leyland,  JoĂ«l Marchand,  François Morain,  Alec Muffett,  Chris Putnam,  Craig Putnam,  Paul Zimmermann,  Factorization of a 512-Bit RSA Modulus, pp. 1 - 18, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 94 times Red Star]

Pierrick Gaudry,  An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves, pp. 19 - 34, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 154 times Red StarRed Star]

Arjen K. Lenstra,  Adi Shamir,  Analysis and Optimization of the TWINKLE Factoring Device, pp. 35 - 52, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 28 times ]

Daniel Bleichenbacher,  Phong Q. Nguyen,  Noisy Polynomial Interpolation and Noisy Chinese Remaindering, pp. 53 - 69, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 78 times Red Star]

François Grieu,  A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme, pp. 70 - 80, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

Marc Girault,  Jean-François Misarsky,  Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1, pp. 81 - 90, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 7 times ]

Jean-SĂ©bastien Coron,  David Naccache,  Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme, pp. 91 - 101, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

Michael Walker,  On the Security of 3GPP Networks, pp. 102 - 103, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

Eyal Kushilevitz,  Rafail Ostrovsky,  One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval, pp. 104 - 121, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]

Giovanni Di Crescenzo,  Tal Malkin,  Rafail Ostrovsky,  Single Database Private Information Retrieval Implies Oblivious Transfer, pp. 122 - 138, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 95 times Red Star]

Mihir Bellare,  David Pointcheval,  Phillip Rogaway,  Authenticated Key Exchange Secure against Dictionary Attacks, pp. 139 - 155, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 671 times Red StarRed StarRed StarRed Star]

Victor Boyko,  Philip D. MacKenzie,  Sarvar Patel,  Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, pp. 156 - 171, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 393 times Red StarRed StarRed Star]

Guillaume Poupard,  Jacques Stern,  Fair Encryption of RSA Keys, pp. 172 - 189, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 45 times ]

Dario Catalano,  Rosario Gennaro,  Shai Halevi,  Computing Inverses over a Shared Secret Modulus, pp. 190 - 206, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 46 times ]

Victor Shoup,  Practical Threshold Signatures, pp. 207 - 220, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 491 times Red StarRed StarRed Star]

Stanislaw Jarecki,  Anna Lysyanskaya,  Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures, pp. 221 - 242, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 62 times Red Star]

Jan Camenisch,  Markus Michels,  Confirmer Signature Schemes Secure against Adaptive Adversaries, pp. 243 - 258, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 98 times Red Star]

Mihir Bellare,  Alexandra Boldyreva,  Silvio Micali,  Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements, pp. 259 - 274, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 185 times Red StarRed Star]

Victor Shoup,  Using Hash Functions as a Hedge against Chosen Ciphertext Attack, pp. 275 - 288, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 139 times Red StarRed Star]

Gilles Brassard,  Norbert LĂĽtkenhaus,  Tal Mor,  Barry C. Sanders,  Security Aspects of Practical Quantum Cryptography, pp. 289 - 299, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

Paul Dumais,  Dominic Mayers,  Louis Salvail,  Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation, pp. 300 - 315, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 42 times ]

Ronald Cramer,  Ivan Damgard,  Ueli M. Maurer,  General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, pp. 316 - 334, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 190 times Red StarRed Star]

Donald Beaver,  Minimal-Latency Secure Function Evaluation, pp. 335 - 350, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 41 times ]

Ueli M. Maurer,  Stefan Wolf,  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free, pp. 351 - 368, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 153 times Red StarRed Star]

Jean-SĂ©bastien Coron,  Marc Joye,  David Naccache,  Pascal Paillier,  New Attacks on PKCS#1 v1.5 Encryption, pp. 369 - 381, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

Éliane Jaulmes,  Antoine Joux,  A NICE Cryptanalysis, pp. 382 - 391, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

Nicolas Courtois,  Alexander Klimov,  Jacques Patarin,  Adi Shamir,  Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, pp. 392 - 407, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 340 times Red StarRed StarRed Star]

Eli Biham,  Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R), pp. 408 - 416, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

Anthony E. Sale,  Colossus and the German Lorenz Cipher - Code Breaking in WW II, pp. 417 - 417, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

Ivan Damgard,  Efficient Concurrent Zero-Knowledge in the Auxiliary String Model, pp. 418 - 430, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 178 times Red StarRed Star]

Fabrice Boudot,  Efficient Proofs that a Committed Number Lies in an Interval, pp. 431 - 444, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 308 times Red StarRed StarRed Star]

Victor Shoup,  A Composition Theorem for Universal One-Way Hash Functions, pp. 445 - 452, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 75 times Red Star]

Ran Canetti,  Yevgeniy Dodis,  Shai Halevi,  Eyal Kushilevitz,  Amit Sahai,  Exposure-Resilient Functions and All-or-Nothing Transforms, pp. 453 - 469, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 115 times Red StarRed Star]

Stefan Lucks,  The Sum of PRPs Is a Secure PRF, pp. 470 - 484, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

Palash Sarkar,  Subhamoy Maitra,  Construction of Nonlinear Boolean Functions with Important Cryptographic Properties, pp. 485 - 506, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 116 times Red StarRed Star]

Anne Canteaut,  Claude Carlet,  Pascale Charpin,  Caroline Fontaine,  Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions, pp. 507 - 522, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 61 times Red Star]

Shin-ichi Kawamura,  Masanobu Koike,  Fumihiko Sano,  Atsushi Shimbo,  Cox-Rower Architecture for Fast Parallel Montgomery Multiplication, pp. 523 - 538, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 37 times ]

Martin Hirt,  Kazue Sako,  Efficient Receipt-Free Voting Based on Homomorphic Encryption, pp. 539 - 556, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 296 times Red StarRed StarRed Star]

Yvo Desmedt,  Kaoru Kurosawa,  How to Break a Practical MIX and Design a New One, pp. 557 - 572, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 101 times Red StarRed Star]

Anne Canteaut,  MichaĂ«l Trabbia,  Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5, pp. 573 - 588, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 156 times Red StarRed Star]

Alex Biryukov,  David Wagner,  Advanced Slide Attacks, pp. 589 - 606, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 117 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...