Cryptology ePrint Archive: Listing for 1999
- 1999/024 (PDF)
- A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion
- M. Bellare, R. Impagliazzo
- 1999/023 (PDF)
- Concurrent Zero-Knowledge
- Cynthia Dwork, Moni Naor, Amit Sahai
- 1999/022 (PDF)
- Resettable Zero-Knowledge
- Ran Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali
- 1999/021 (PDF)
- Public-Key Cryptography and Password Protocols: The Multi-User Case
- Maurizio Kliban Boyarsky
- 1999/020 (PDF)
- Improving the Exact Security of Digital Signature Schemes
- Silvio Micali, Leonid Reyzin
- 1999/019 (PDF)
- Security of all RSA and Discrete Log Bits
- Johan Hastad, Mats Naslund
- 1999/018 (PDF)
- Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
- Mihir Bellare, Amit Sahai
- 1999/017 (PDF)
- A Composition Theorem for Universal One-Way Hash Functions
- Victor Shoup
- 1999/016 (PDF)
- A forward-secure digital signature scheme
- Mihir Bellare, Sara Miner
- 1999/015 (PDF)
- Interleaved Zero-Knowledge in the Public-Key Model
- Oded Goldreich, Shafi Goldwasser, Silvio Micali
- 1999/014 (PDF)
- Concurrent Zero-Knowledge is Easy in Practice
- Ivan Damgard
- 1999/013 (PDF)
- Secure Hash-and-Sign Signatures without the Random Oracle
- Rosario Gennaro, Shai Halevi, Tal Rabin
- 1999/012 (PDF)
- On Formal Models for Secure Key Exchange
- Victor Shoup
- 1999/011 (PDF)
- Practical Threshold Signatures
- Victor Shoup
- 1999/010 (PDF)
- A Relationship between One-Wayness and Correlation Intractability
- Satoshi Hada, Toshiaki Tanaka
- 1999/009 (PDF)
- On the Existence of3-Round Zero-Knowledge Protocols
- Satoshi Hada, Toshiaki Tanaka
- 1999/008 (PDF)
- Verifiable Encryption and Applications to Group Signatures and Signature Sharing
- Jan Camenisch, Ivan Damgaard
- 1999/007 (PDF)
- DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem
- Michel Abdalla, Mihir Bellare, Phillip Rogaway
- 1999/005 (PDF)
- Lattice Based Cryptography: A Global Improvement
- Daniele Micciancio
- 1999/004 (PDF)
- Public-key cryptography and password protocols
- Shai Halevi, Hugo Krawczyk
- 1999/003 (PDF)
- An error in the mixed adversary protocol by Fitzi, Hirt and Maurer
- Ivan Damgard
- 1999/002 (PDF)
- Chinese Remaindering with Errors
- Oded Goldreich, Dana Ron, Madhu Sudan
- 1999/001 (PDF)
- Signature Schemes Based on the Strong RSA Assumption
- Ronald Cramer, Victor Shoup
[ Cryptology ePrint archive]