Cryptology ePrint Archive: Listing for 1998
-
1998/026 ( PS PS.GZ )
- Comparing Entropies in Statistical Zero-Knowledge with Applications to the Structure of SZK
- Oded Goldreich and Salil Vadhan
-
1998/025 ( PS PS.GZ )
- Secure Distributed Storage and Retrieval
- Juan A. Garay, Rosario Gennaro, Charanjit Jutla, and Tal Rabin
-
1998/024 ( PS PS.GZ )
- The Disparity between Work and Entropy in Cryptology
- John Pliam
-
1998/023 ( PS PS.GZ )
- Security amplification by composition: The case of doubly-iterated, ideal ciphers
- William Aiello, Mihir Bellare, Giovanni Di Crescenzo and Ramarathnam Venkatesan
-
1998/022 ( PS PS.GZ )
- Insecurity of Quantum Computations
- Hoi-Kwong Lo
-
1998/021 ( PS PS.GZ )
- Relations among Notions of Security for Public-Key Encryption Schemes
- Mihir Bellare,Anand Desai, David Pointcheval and Phillip Rogaway
-
1998/020 ( PS PS.GZ )
- Almost All Discrete Log Bits Are Simultaneously Secure
- Claus P. Schnorr
-
1998/019 ( PS PS.GZ )
- Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems
- Mihir Bellare, Shai Halevi, Amit Sahai and Salil Vadhan
-
1998/018 ( PS PS.GZ )
- Security and Composition of Multi-party Cryptographic Protocols
- Ran Canetti
-
1998/017 ( PS PS.GZ )
- Making An Empty Promise With A Quantum Computer (Or, A Brief Review on the Impossibility of Quantum Bit Commitment)
- H. F. Chau and H.-K. Lo
-
1998/016 ( -- withdrawn -- )
- Quantum Computers Render Quantum Key Distribution Unconditionally Secure Over Arbitrarily Long Distances
- Hoi-Kwong Lo and H. F. Chau
-
1998/015 ( PS PS.GZ )
- More on Proofs of Knowledge
- Shai Halevi and Silvio Micali
-
1998/014 ( PS PS.GZ )
- Randomness versus Fault-Tolerance
- Ran Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosen
-
1998/013 ( PS PS.GZ )
- A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic PIR Avoiding Data Replication)
- Yael Gertner, Shafi Goldwasser, Tal Malkin
-
1998/012 ( PS PS.GZ )
- Maintaining Authenticated Communication in the Presence of Break-ins
- Ran Canetti, Shai Halevi, Amir Herzberg
-
1998/011 ( PS PS.GZ PDF )
- The Random Oracle Methodology, Revisited
- Ran Canetti, Oded Goldreich, Shai Halevi
-
1998/010 ( PS PS.GZ )
- Chameleon Hashing and Signatures
- Hugo Krawczyk and Tal Rabin
-
1998/009 ( PS PS.GZ )
- A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
- Mihir Bellare, Ran Canetti, and Hugo Krawczyk
-
1998/008 ( PS PS.GZ )
- An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products
- Rosario Gennaro and Daniele Micciancio and Tal Rabin
-
1998/007 ( PS PS.GZ )
- Fast Batch Verification for Modular Exponentiation and Digital Signatures
- Mihir Bellare, Juan A. Garay, and Tal Rabin
-
1998/006 ( PS PS.GZ )
- A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
- Ronald Cramer and Victor Shoup
-
1998/005 ( PS PS.GZ )
- On the possibility of basing Cryptography on the assumption that $P \neq NP$
- Oded Goldreich and Shafi Goldwasser
-
1998/004 ( PS PS.GZ )
- Universal Service Providers for Database Private Information Retrieval
- Giovanni Di-Crescenzo and Yuval Ishai and Rafail Ostrovsky
-
1998/003 ( PS PS.GZ )
- Private Information Retrieval by Keywords
- Benny Chor, Niv Gilboa, and Moni Naor
-
1998/002 ( PS PS.GZ )
- The Graph Clustering Problem has a Perfect Zero-Knowledge Proof
- A. De Santis, G. Di Crescenzo, O. Goldreich, and G. Persiano.
-
1998/001 ( PS PS.GZ )
- On Protocol Divertibility
- Gerrit Bleumer
[ Cryptology ePrint archive ]