Papers accepted for presentation in Crypto'98: A Simplified Approach to Threshold and Proactive RSA Tal Rabin The solution of McCurley's discrete log challenge Damian Weber, Thomas F. Denny Self-Delegation with Controlled Propagation -- or -- What If You Lose Your Laptop Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest Fast RSA-type cryptosystem modulo $p^k q$ Tsuyoshi Takagi Differential Collisions: an Explanation for SHA-1 Florent Chabaud, Antoine Joux Time-stamping with binary linking schemes Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson Cryptanalysis of the Ajtai-Dwork Cryptosystem Phong Nguyen, Jacques Stern Cryptanalysis of the Chor-Rivest Cryptosystem Serge Vaudenay Threshold Traitor Tracing Moni Naor, Benny Pinkas Trading Correctness for Privacy in Unconditional Multi-Party Computation Matthias Fitzi, Martin Hirt, Ueli Maurer Cryptanalysis of the Oil & Vinegar Signature Scheme Aviad Kipnis, Adi Shamir On the Existence of 3-Round Zero-Knowledge Protocols Satoshi Hada, Toshiaki Tanaka Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? Ronald Cramer, Ivan Damgaard Quantum Bit Commitment From a Physical Assumption Louis Salvail Generalized birthday attacks on unbalanced Feistel Networks Charanjit S. Jutla Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms Daniel Bailey, Christof Paar Plaintext Awareness, Non-Malleability, and Chosen Ciphertext Security: Implications and Separations Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway The Exact Security of Signature Schemes Tatsuaki Okamoto, Kazuo Ohta >From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs Moni Naor, Omer Reingold New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications Dario Catalano, Rosario Gennaro Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints Cynthia Dwork, Amit Sahai A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack Ronald Cramer, Victor Shoup >From Differential Cryptanalysis to Ciphertext-Only Attacks Alex Biryukov, Eyal Kushilevitz Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES Takeshi Shimoyama, Toshinobu Kaneko Cryptanalysis of Block Ciphers with Probabilistic Non-Linear Relations of Low Degree Thomas Jakobsen Identity Escrow Joe Kilian, Erez Petrank The Security of Composing Two Ideal Ciphers William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan Fast Digital Identity Revocation W. Aiello, S. Lodha, R. Ostrovsky Trapdoor Functions and Public-Key Cryptosystems Mihir Bellare, Shai Halevi, Amit Sahai, Salil Vadhan An Efficient Discrete Log Pseudo Random Generator Sarvar Patel, Ganapathy S. Sundaram Chosen Ciphertext Attacks against protocols Based on the RSA Encryption Standard PKCS #1 Daniel Bleichenbacher An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm Neal Koblitz Building PRFs from PRPs Chris Hall, John Kelsey, Bruce Schneier, David Wagner