What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 2000
Year
Venue
Title
2000
CRYPTO
A Chosen-Ciphertext Attack against NTRU
Éliane Jaulmes
Antoine Joux
2000
CRYPTO
A Cryptographic Solution to a Game Theoretic Problem
Yevgeniy Dodis
Shai Halevi
Tal Rabin
2000
CRYPTO
A Note on the Round-Complexity of Concurrent Zero-Knowledge
Alon Rosen
2000
CRYPTO
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
Giuseppe Ateniese
Jan Camenisch
Marc Joye
Gene Tsudik
2000
CRYPTO
Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings
2000
CRYPTO
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications
Jürgen Bierbrauer
Holger Schellwat
2000
CRYPTO
An Improved Pseudo-random Generator Based on Discrete Log
Rosario Gennaro
2000
CRYPTO
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions
John Black
Phillip Rogaway
2000
CRYPTO
Differential Fault Attacks on Elliptic Curve Cryptosystems
Ingrid Biehl
Bernd Meyer
Volker Müller
2000
CRYPTO
Efficient Non-malleable Commitment Schemes
Marc Fischlin
Roger Fischlin
2000
CRYPTO
Fast Correlation Attacks through Reconstruction of Linear Polynomials
Thomas Johansson
Fredrik Jönsson
2000
CRYPTO
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption
Ivan Damgård
Jesper Buus Nielsen
2000
CRYPTO
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
Don Coppersmith
Lars R. Knudsen
Chris J. Mitchell
2000
CRYPTO
L-collision Attacks against Randomized MACs
Michael Semanko
2000
CRYPTO
Linking Classical and Quantum Key Agreement: Is There ``Bound Information''?
Nicolas Gisin
Stefan Wolf
2000
CRYPTO
Long-Lived Broadcast Encryption
Juan A. Garay
Jessica Staddon
Avishai Wool
2000
CRYPTO
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
Muxiang Zhang
Agnes Hui Chan
2000
CRYPTO
New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack
Anand Desai
2000
CRYPTO
New Public-Key Cryptosystem Using Braid Groups
Ki Hyoung Ko
Sangjin Lee
Jung Hee Cheon
Jae Woo Han
Ju-Sung Kang
Choonsik Park
2000
CRYPTO
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
Palash Sarkar
Subhamoy Maitra
2000
CRYPTO
On the Exact Security of Full Domain Hash
Jean-Sébastien Coron
2000
CRYPTO
On the Round Security of Symmetric-Key Cryptographic Primitives
Zulfikar Ramzan
Leonid Reyzin
2000
CRYPTO
Optimistic Fair Secure Computation
Christian Cachin
Jan Camenisch
2000
CRYPTO
Parallel Reducibility for Information-Theoretically Secure Computation
Yevgeniy Dodis
Silvio Micali
2000
CRYPTO
Privacy Preserving Data Mining
Yehuda Lindell
Benny Pinkas
2000
CRYPTO
Provably Secure Partially Blind Signatures
Masayuki Abe
Tatsuaki Okamoto
2000
CRYPTO
Quantum Public-Key Cryptosystems
Tatsuaki Okamoto
Keisuke Tanaka
Shigenori Uchiyama
2000
CRYPTO
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Amos Beimel
Yuval Ishai
Tal Malkin
2000
CRYPTO
Sequential Traitor Tracing
Reihaneh Safavi-Naini
Yejing Wang
2000
CRYPTO
Taming the Adversary
★
Invited paper
Martín Abadi
2000
CRYPTO
The development of DES
★
Invited talk
Don Coppersmith
2000
CRYPTO
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
Anand Desai
2000
CRYPTO
The XTR Public Key System
Arjen K. Lenstra
Eric R. Verheul
2000
CRYPTO
Timed Commitments
Dan Boneh
Moni Naor
2000
CRYPTO
Weaknesses in the SL<sub>2</sub>(IF<sub>s<sup>2</sup></sub>) Hashing Scheme
Rainer Steinwandt
Markus Grassl
Willi Geiselmann
Thomas Beth