## Advances in Cryptology - CRYPTO '98: 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, ProceedingsThis book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO'98, held in Santa Barbara, California, USA, in August 1998. The book presents 33 revised full papers selected from a total of 144 submissions received. Also included are two invited presentations. The papers are organized in topical sections on chosen ciphertext security, cryptanalysis of hash functions and block ciphers, distributed cryptography, zero knowledge, and implementation. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

ChosenCiphertext Security | 1 |

Relations Among Notions of Security for PublicKey Encryption Schemes | 26 |

Invited Lecture | 46 |

Copyright | |

14 other sections not shown

### Other editions - View all

### Common terms and phrases

0-tokens Advances in Cryptology adversary algorithm assume assumption authentication Bellare bits block cipher bound certificate chosen ciphertext attack ciphertext-only attack commitment scheme Computer Science construction cryptanalysis Crypto cryptography decoder decryption oracle defined definition denote Diffie-Hellman digital signatures discrete log discrete logarithm distribution efficient elliptic curve encryption scheme equations escrow exists factor Feistel networks finite field given Goldreich hash function implementation input integer interaction Lemma linear LNCS Madryga Micali modulo multiplication Naor nodes one-way functions output paper parameter permutation plaintext players polynomial prime probabilistic probability problem Proceedings proof system protocol prove pseudo-random pseudo-random functions public key cryptosystems queries random oracle result revoked round S-boxes secondary key secret key secret sharing semantically secure signature scheme simulator Springer-Verlag Step string Theorem threshold time-stamps trapdoor functions trusted center valid vector verifier zero zero-knowledge proof