Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eprint 1999
Page
Title
Signature Schemes Based on the Strong RSA Assumption
Chinese Remaindering with Errors
An error in the mixed adversary protocol by Fitzi, Hirt and Maurer
Public-key cryptography and password protocols
Lattice Based Cryptography: A Global Improvement
Fast Proof of Plaintext-Knowledge and Deniable Authentication Based on Chinese Remainder Theorem
DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem
Verifiable Encryption and Applications to Group Signatures and Signature Sharing
On the Existence of 3-Round Zero-Knowledge Protocols
A Relationship between One-Wayness and Correlation Intractability
Practical Threshold Signatures
On Formal Models for Secure Key Exchange
Secure Hash-and-Sign Signatures without the Random Oracle
Concurrent Zero-Knowledge is Easy in Practice
A forward-secure digital signature scheme
A Composition Theorem for Universal One-Way Hash Functions
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
Improving the Exact Security of Digital Signature Schemes
Public-Key Cryptography and Password Protocols: The Multi-User Case
Resettable Zero-Knowledge
Concurrent Zero-Knowledge
A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion