Crypto '99 Accepted Papers -------------------------- Weakness in Quaternion Signatures Don Coppersmith On the Security Properties of OAEP as an All-or-nothing Transform Victor Boyko Cryptanalysis of "2R" Schemes Dingfeng Ye, Kwok-Yan Lam, Zongduo Dai Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality Subhamoy Maitra, Palash Sarkar A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting Berry Schoenmakers Can Statistical Zero Knowledge be Made Non-Interactive? or On the Relationship of SZK and NISZK Oded Goldreich, Amit Sahai, Salil Vadhan Dynamic Traitor Tracing Amos Fiat, Tamir Tassa The Hardness of the Hidden Subset Sum Problem and its Cryptographic Implications Phong Nguyen, Jacques Stern Efficient methods for integrating traceability and broadcast encryption Eli Gafni, Jessica Staddon, Yiqun Lisa Yin Distributed Multiplication and Its Application Masayuki Abe Truncated Differentials and Skipjack Lars R. Knudsen, M.J.B. Robshaw, David Wagner Separability and Efficiency for Generic Group Signature Schemes Jan Camenisch, Markus Michels Fast Correlation Attacks based on Turbo Code Techniques Thomas Johansson, Fredrik Jönsson Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97 Phong Nguyen Differential Power Analysis: Leaking Secrets Paul Kocher, Joshua Jaffe, Benjamin Jun UMAC: Fast and Secure Message Authentication John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway A New Signature Forgery Strategy Jean-S\'ebastien Coron, David Naccache, Julien P. Stern Cryptanalysis of the HFE Public Key Cryptosystem Aviad Kipnis, Adi Shamir Auditable, Anonymous Electronic Cash T. Sander, A. Ta-Shma The All-Or-Nothing Nature of Two-Party Secure Computation Amos Beimel, Tal Malkin, Silvio Micali Factoring N = p^r q for Large r Dan Boneh, Glenn Durfee, Nicholas Howgrave-Graham Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions Jee Hea An, Mihir Bellare Beyond the birthday barrier, without counters Mihir Bellare, Oded Goldreich, Hugo Krawczyk Information Theoretically Secure Communication in the Limited Storage Space Model Yonatan Aumann, Michael Rabin A Forward-Secure Digital Signature Scheme Mihir Bellare, Sara Miner Towards Sound Approaches to Counteract Power Analysis Attacks Suresh Chari, Charanjit Jutla, Josyula R. Rao, Pankaj Rohatgi Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization Mihir Bellare, Amit Sahai Adaptive Oblivious Transfer Moni Naor, Benny Pinkas An Information Theoretic Analysis of Rooted Tree Based Secure Multicast Key Distribution Schemes R. Poovendran, J. S. Baras Abuse-free Optimistic Contract Signing Juan Garay, Markus Jakobsson, Philip MacKenzie Adaptive Security for Threshold Cryptosystems R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin Compressing Cryptographic Resources Niv Gilboa, Yuval Ishai A New Approach to Tracing Traitors Dan Boneh, Matt Franklin Square Hash: Fast Message Authentication via Optimized Universal Hash Functions Sarvar Patel, Zulfikar Ramzan Coding constructions for blacklisting problems without computational assumptions Ravi Kumar, Sridhar Rajagopalan, Amit Sahai Two Party RSA Key Generation Niv Gilboa Secure Integration of Asymmetric and Symmetric Encryption Schemes Eiichiro Fujisaki, Tatsuaki Okamoto Concurrent Zero-Knowledge: Avoiding Impossibility with Pre-Processing Giovanni Di Crescenzo, Rafail Ostrovsky