Theory of Cryptography Library: 1997 Records
This web page provides access to recent work on Theory of Cryptography.
Work has been placed here by the authors and did not undergo any
refereeing process other than verifying that the work seems to be
within scope and of some interest to the subscribers.
- 96-00:
O. Goldreich, An Example of a Library Record,
[Abstract]
[full paper
(rev.)]
- 97-01: M. Bellare and D. Micciancio,
A New Paradigm for Collision-free Hashing:
Incrementality at Reduced Cost, February 1997.
[Abstract]
[full paper]
- 97-02: M. Bellare, M. Jakobsson and M. Yung,
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function,
February 1997.
[Abstract]
[full
paper (rev. July 1997)]
- 97-03:
C. Crepeau,
Efficient Cryptographic Protocols Based on Noisy Channels, March 1997.
[Abstract]
[full paper]
- 97-04:
M. Bellare, A Note on Negligible Functions, March 1997.
[Abstract]
[full paper]
- 97-05:
S. Decatur, O. Goldreich, D. Ron,
A Probabilistic Error-Correcting Scheme, April 1997.
[Abstract]
[full
paper (rev. June 1997)]
- 97-06:
Y. Ishai, E. Kushilevitz,
Protecting Data Privacy in Private Information Retrieval Schemes,
May 1997.
[Abstract]
[full paper]
- 97-07:
R. Canetti,
Towards realizing random oracles:
Hash functions that hide all partial information, June 1997.
[Abstract]
[full paper]
- 97-08:
H. Ritter, C. Roessner,
Factoring via Strong Lattice Reduction Algorithms, June 1997.
[Abstract]
[full paper]
- 97-09:
M. Bellare and P. Rogaway,
Collision-Resistant Hashing: Towards Making UOWHFs Practical,
July 1997.
[Abstract]
[full paper]
- 97-10:
E. Petrank and C. Rackoff,
CBC MAC for Real-Time Data Sources, August 1997.
[Abstract]
[full paper]
- 97-11:
J. Kilian and E. Petrank,
Identity Escrow, August 1997.
[Abstract]
[full paper]
- 97-12:
O. Goldreich, B. Pfitzmann, and R.L. Rivest,
Self-Delegation with Controlled Propagation
- or - What If You Lose Your Laptop, September 1997.
[Abstract]
[full paper]
- 97-13:
M. Naor and B. Pinkas,
Visual Authentication and Identification, October 1997.
[Abstract]
[full paper]
- 97-14:
E. Biham, D. Boneh and O. Reingold, Generalized Diffie-Hellman
Modulo a Composite is not Weaker than Factoring, November 1997.
[Abstract]
[full paper]
- 97-15:
N. Asokan, V. Shoup, M. Waidner,
Optimistic fair Exchange of Digital Signatures, Dec. 1997.
[Abstract]
[full paper]
The library's resides on the web server of
the Theory of Computation Group
at the Laboratory for Computer Science
of MIT.
The library is currently maintained by
Oded Goldreich.
Back to the library's main page
or to the library's Archive.