Please click our sponsor

Crypto Bibliography Year 1998

M. Abadi, Two Facets of Authentication, Proceedings of the 11th IEEE Computer Security Foundations Workshop (June 1998), 25-32. Also appeared as SRC Technical Note 1998-007 (March 1998).

M. Abadi, Protection in Programming-Language Translations, Automata, Languages and Programming: 25th International Colloquium, ICALP'98 (July 1998), 868-883. Also appeared as SRC Research Report 154 (April 1998).

M. Abdalla, M. Bellare, and P. Rogaway, DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem [.ps.gz] [.ps] [.pdf], Contributions to P1363, September 1998. [.ps]

M. Abdalla, W. Cirne, L. Franklin, A. Sterrett, and K. Marzullo, Chimichanga: A Fault-tolerant Asynchronous Communication Infrastructure for Mobile Agents [.ps.gz] [.ps], March 1998.

W. Aiello, M. Bellare, G. Di Crescenzo, and R. Venkatesan, Security amplification by composition: The case of doubly-iterated, ideal ciphers, Extended abstract in Advances in Cryptology -- Crypto 98 Proceedings, Lecture Notes in Computer Science v. 1462, H. Krawczyk ed, Springer-Verlag, 1998. Full version available.

R. Anderson, B. Crispo, C. Manifavas, V. Matyas, and F. Petitcolas, The Global Trust Register, Datasem '98, pp 219-241, Brno, Czech Republic, October 1998.

R. Anderson, F. Bergadano, B. Crispo, J. Lee, C. Manifavas, and R. Needham, A New Family of Authentication Protocols, Operating Systems Review, vol. 32, n. 4, pp. 9-20, October 1998, ACM Press.

R. Anderson, E. Biham, and L. Knudsen, Serpent and Smartcards, CARDIS '98.

R. Anderson and F. Peticolas, On the Limits of Steganography, IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright & Privacy Protection, vol. 16 no. 4, pp. 474-481, May 1998.

V. Anupam and A. Mayer, Secure Web Scripting, IEEE Internet Computing, Nov/Dec 1998.

V. Anupam and A. Mayer, Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies, Proc. 7th USENIX Security Symposium, 1998.

P. Ashley, M. Vandenwauver, and J. Claessens, A Comparison of SESAME and SSL for Intranet and Internet Security, IFIP WG 11.1 & 11.2 Information Security Management and Small Systems Security, 1998, pp 60-69.

N. Asokan, V. Shoup, and M. Waidner, Asynchronous Protocols for Optimistic Fair Exchange, In Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, pages 86-99, Oakland, CA, May 1998. IEEE Computer Society Press.

G. Ateniese, M. Steiner, and G. Tsudik, Authenticated Group Key Agreement and Friends, in Fifth ACM Conference on Computer and Communications Security, San Francisco, CA, November 1998.

T. Aura, P. Koponen, and J. Räsänen, Delegation-based access control for intelligent network services, Proceedings of ECOOP Workshop on Distributed Object Security, Brussels, Belgium, July 1998.

D. Balfanz and L. Gong, Experience with Secure Multi-Processing in Java, Proceedings of the 18th IEEE International Conference on Distributed Computing Systems (ICDCS), Amsterdam, Netherlands, May 1998.

A. Beimel and B. Chor, Secret Sharing with Public Reconstruction, IEEE Trans. on Info. Theory, 44(5):1887-1896, 1998. Extended abstract in Crypto '95.

M. Bellare, S. Halevi, A. Sahai, and S. Vadhan, Many-to-one trapdoor functions and their relation to public-key cryptosystems, Extended abstract in Advances in Cryptology -- Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed, Springer-Verlag, 1998.

M. Bellare, T. Krovetz, and P. Rogaway, Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible, Extended abstract in Advances in Cryptology -- Eurocrypt 98 Proceedings, Lecture Notes in Computer Science Vol. 1403, K. Nyberg ed, Springer-Verlag, 1998.

M. Bellare, Practice-Oriented Provable-Security, Proceedings of First International Workshop on Information Security (ISW 97), Lecture Notes in Computer Science Vol. 1396, E. Okamoto, G. Davida and M. Mambo eds., Springer Verlag, 1998.

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among notions of security for public-key encryption schemes, Extended abstract in Advances in Cryptology -- Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed, Springer-Verlag, 1998.

M. Bellare, J. Garay, and T. Rabin, Fast batch verification for modular exponentiation and digital signatures; Extended abstract in Advances in Cryptology- Eurocrypt 98 Proceedings, Lecture Notes in Computer Science Vol. ??, K. Nyberg ed, Springer-Verlag, 1998.

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among notions of security for public-key encryption schemes; Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science, Vol. 1462, H. Krawczyk, ed., Springer-Verlag.

M. Bellare, J. Garay, C. Jutla, and M. Yung, VarietyCash: A Multi-purpose Electronic Payment System, Proceedings of the 3rd Usenix Workshop on Electronic Commerce, Usenix, 1998.

M. Bellare, R. Canetti, and H. Krawczyk, A modular approach to the design and analysis of authentication and key exchange protocols, Extended abstract in Proceedings of 30th Annual Symposium on the Theory of Computing, ACM, 1998.

S. Bellovin, Cryptography and the Internet, Proceedings of CRYPTO '98, August 1998, pp. 46-55.

E. Biham, A. Biryukov, and A. Shamir, Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials, Technical Reports of the Computer Science Department in the Technion, 0947.

E. Biham, D. Boneh, and O. Reingold, Generalized Diffie-Hellman modulo a composite is not weaker than factoring, Information Processing Letters (IPL), to appear.

E. Biham, A. Biryukov, O. Dunkelman, E. Richardson, and A. Shamir, Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR, Proceedings of SAC'98.

E. Biham, A. Biryukov, N. Ferguson, L. Knudsen, B. Schneier, and A. Shamir, Cryptanalysis of Magenta, distributed at the first AES conference, August 20, 1998.

A. Biryukov and E. Kushilevitz, From Differential Cryptanalysis to Ciphertext-Only Attacks [.ps.gz] [.ps], proceedings of CRYPTO'98, LNCS 1462.

A. Biryukov and E. Kushilevitz, Improved Cryptanalysis of RC5, EuroCrypt 98.

S. Blackburn, S. Blake-Wilson, M. Burmeister, and S. Galbraith, Shared generation of shared RSA Keys, Tech. Report CORR 98-19, University of Waterloo.

M. Blaze, J. Feigenbaum, and M. Strauss, Compliance Checking in the PolicyMaker Trust-Management System, in Proceedings of the 2nd Financial Crypto Conference, Lecture Notes in Computer Science, vol. 1465, Springer, Berlin, 1998.

M. Blaze, J. Feigenbaum, and M. Naor, A Formal Treatment of Remotely Keyed Encryption (Extended Abstract), in Advances in Cryptology - Eurocrypt '98, Lecture Notes in Computer Science, vol. 1403, Springer, Berlin, 1998, pp. 251-265. Preprint of journal version is available from the authors via email.

M. Blaze and M. Strauss, Atomic Proxy Cryptography, Eurocrypt '98.

M. Blaze, J. Feigenbaum, and M. Naor, A Formal Treatment of Remotely-Keyed Encryption; Eurocrypt 98.

M. Blaze, J. Feigenbaum, and A. Keromytis, KeyNote: Trust Management for Public-Key Infrastructures (Position Paper), in Proceedings of the 1998 Cambridge University Security Protocols International Workshop, Springer, Berlin, to appear.

D. Bleichenbacher, Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1 [.ps.gz] [.ps], Advances in Cryptology -- CRYPTO'98, LNCS v. 1462, pp. 1-12, 1998.

D. Bleichenbacher, E. Gabber, P. Gibbons, Y. Matias, and A. Mayer, On Secure and Pseudonymous Client Relationships with Multiple Servers, Proc. 3rd USENIX Workshop on Electronic Commerce, 1998.

D. Bleichenbacher, E. Gabber, M. Jakobsson, Y. Matias, and A. Mayer, Curbing Junk E-mail via Secure Classification, Proc. Financial Cryptography'98, Springer-Verlag LNCS 1465.

D. Bleichenbacher, B. Kaliski, and J. Staddon, Recent results on PKCS #1: RSA encryption standard [.pdf] [.ps], RSA Laboratories' bulletin #7, June 1998.

C. Blundo, A. De Santis, K. Kurosawa, and W. Ogata, On a Fallacious Bound for Authentication Codes, Journal of Cryptology, to appear.

D. Boneh, The decision Diffie-Hellman problem, Proceedings of the Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, Vol. 1423, Springer-Verlag, pp. 48--63, 1998.

D. Boneh and R. Venkatesan, Breaking RSA may not be equivalent to factoring, Proceedings Eurocrypt '98, Lecture Notes in Computer Science, Vol. 1233, Springer-Verlag, 1998, pp. 59-71.

D. Boneh and J. Horwitz, Generating a Product of Three Primes With an Unknown Factorization, Proceedings of the third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, Vol. 1423, Springer-Verlag, 1998, pp. 237-251.

D. Boneh, G. Durfee, and Y. Frankel, An attack on RSA given a small fraction of the private key bits, Proceedings of AsiaCrypt '98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, pp. 25-34, 1998.

D. Boneh and J. Shaw, Collusion Secure Fingerprinting for Digital Data, IEEE Transactions on Information Theory, Vol 44, No. 5, 1998, pp. 1897-1905.

D. Boneh and G. Durfee , New results on the cryptanalysis of low private exponent RSA, Submitted to Eurocrypt '99.

G. Brassard, C. Crépeau, and D. Mayers and L. Salvail, Defeating classical Bit Commitment Schemes with a Quantum Computer; Submitted to Advances in Cryptology: Proceedings of Crypto '98, Springer-Verlag, 1998.

L. Brown and J. Pieprzyk, Introducing the new LOKI97 Block Cipher, Technical Report No. CS02/98, Jun 1998.

A. Buldas, P. Laud, H. Lipmaa, and J. Villemson, Time-stamping with binary linking schemes, Advances on Cryptology -- CRYPTO '98, Springer-Verlag (August 1998), 486-501.

A. Buldas and H. Lipmaa, Digital Signatures, Timestamps and the corresponding Infrastructure, Küberneetika AS, Technical Report 1998-21, Jan 1998.

A. Buldas and P. Laud, New Linking Schemes for Digital Time-Stamping, To be published in Proceedings for the 1998 International Conference on Information Security and Cryptology(ICISC'98), by Korea Institute of Information Security and Cryptology.

C. Burwick, D. Coppersmith, E. D'Avignon, R. Gennaro, S. Halevi, C. Jutla, S. Matyas Jr., L. O'Connor, M. Peyravian, D. Safford, and N. Zunic, MARS - a candidate cipher for AES, First AES conference, 1998.

C. Cachin, C. Crépeau, and J. Marcil., Oblivious transfer with a memory-bounded receiver [.ps] [.ps.gz], Proc. 39th IEEE Symposium on Foundations of Computer Science (FOCS), 1998.

C. Cachin, An information-theoretic model for steganography [.ps] [.ps.gz], Proc. 2nd Workshop on Information Hiding, Lecture Notes in Computer Science, David Aucsmith, ed. Springer-Verlag, 1998.

C. Cachin, On the foundations of oblivious transfer [.ps] [.ps.gz], Advances in Cryptology: EUROCRYPT '98, Lecture Notes in Computer Science v. 1403, Kaisa Nyberg, ed., pp. 361-374. Springer-Verlag, 1998.

C. Cachin, Hashing a source with an unknown probability distribution [.ps] [.ps.gz]; manuscript (Abstract in Proc. 1998 IEEE International Symposium on Information Theory, Boston), 1998.

J. Camenisch, Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem [.ps] [.ps.gz], Vol. 2 of ETH-Series in Information Security and Cryptography, ISBN 3-89649-286-1, Hartung-Gorre Verlag, Konstanz, 1998, 174 pages.

J. Camenisch and M. Michels, A Group Signature Scheme Based on an RSA-Variant [.pdf] [.ps.gz], BRICS Technical Report, RS-98-27. A preliminary version of this paper appeared in Advances in Cryptology - ASIACRYPT '98.

R. Canetti, O. Goldreich, and S. Halevi, The Random Oracle Methodology, Revisited, March 1998.

D. Catalano and R. Gennaro, New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications, CRYPTO'98.

D. Catalano and R. Gennaro, New and Efficient Protocols for Verifiable Signature Sharing and Other Applications, CRYPTO '98.

P. Chen, J. Garay, A. Herzberg, and H. Krawczyk, A Security Architecture for the Internet Protocol, IBM Systems Journal 37, No. 1 (1998).

J. Claessens, M. Vandenwauver, B. Preneel, and J. Vandewalle, Setting up a secure web server and clients on an Intranet, IEEE 7th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'98), 1998, pp 295-300.

A. Clark, Data Security in X.25 Networks, Corporate Computer Security (Scotland), Edinburgh.

A. Clark, Tamper Resistance and Cryptovariable Protection (updated paper), Corporate Computer Security, Brighton, from the original presented at Eurocrypt '87, Amsterdam.

R. Cramer and I. Damgård, Zero-Knowledge for Finite Field Arithmetic. Or: Can Zero-Knowledge be for Free?, Proceedings of CRYPTO '98, Springer Verlag LNCS, vol. 1462, pp. 424-441, 1998.

R. Cramer and V. Shoup, Signature schemes based on the Strong RSA Assumption, Preprint, 1998.

J. Daemen and V. Rijmen, J. Daemen and V. Rijmen, The Block Cipher Rijndael, Proc. of CARDIS'98, LNCS, Springer-Verlag, to appear.

N. Daswani, D. Boneh, H. Gracia-Molina, S. Ketchpel, and A. Paepcke, A Generalized Wallet Architecture, Proceedings of the 3rd USENIX Workshop on Electronic Commerce, 1998.

E. De Win, S. Mister, B. Preneel, and M. Wiener, On the performance of signature schemes based on elliptic curves, Algorithmic Number Theory Symposium III, LNCS 1423, J.P. Buhler, Ed., Springer-Verlag, 1998, pp. 252-266.

E. De Win and B. Preneel, Elliptic curve public-key cryptosystems - an introduction, State of the Art in Applied Cryptography, LNCS 1528, B. Preneel and V. Rijmen, Eds., Springer-Verlag, 1998, pp. 131-141.

Y. Desmedt, S. Huo, and J.-J. Quisquater, Audio and Optical Cryptography, Asiacrypt '98.

Y. Desmedt and K. Kurosawa, Practical and proven zero-knowledge constant round variants of GQ and Schnorr, IEICE, Trans. on Fundamentals, to appear.

J.-F. Dhem, F. Koeune, P.-A. Leroux, P. Mestré, J.-J. Quisquater, and J.-L. Williams, A practical implementation of the Timing Attack, Proc. of CARDIS 1998, 14-16th September 1998.

J. Feigenbaum, In Defense of Metadata Platforms: Position Paper, in Proceedings of the DIMACS Workshop on ``Design for Values: Ethical, Social, and Political Dimensions of Information Technology,'' 1998, pp. 20-24..

J. Feigenbaum, Talk Abstracts: DIMACS Research and Educational Institute on Cryptography and Network Security (DREI '97), DIMACS Technical Report 97-80, Rutgers University, Piscataway, 1998.

J. Feigenbaum and P. Lee, Trust Management and Proof-Carrying Code in Secure Mobile-Code Applications: Position Paper, in Proceedings of the DARPA Workshop on "Foundations for Secure Mobile Code," pp. 48-55.

J. Feigenbaum, Towards an Infrastructure for Authorization: Position Paper, to be presented at the 1998 USENIX Ecommerce Conference.

J. Feigenbaum, S. Kannan, M. Vardi, and M. Vishwanathan, Complexity of Graph Problems Represented by OBDDs, Chicago Journal of Theoretical Computer Science, to appear. Extended abstract appears in Proceedings of the 1998 Symposium on Theoretical Aspects of Computer Science.

J. Feigenbaum, Overview of the AT&T Labs Trust-Management Project: Position Paper, in Proceedings of the 1998 Cambridge University Security Protocols International Workshop.

M. Fischlin, Cryptographic Limitations on Parallelizing Membership and Equivalence Queries with Applications to Random Self-Reductions, 9th International Conference on Algorithmic Learning Theory - ALT'98, Lecture Notes in Artificial Intelligence/Computer Science, Vol.1501, Springer-Verlag, pp.72-84, 1998.

M. Fitzi, M. Hirt, and U. Maurer, Trading Correctness for Privacy in Unconditional Multi-Party Computation, Advances in Cryptology -- Crypto '98, 1998.

B. Fox, B. LaMacchia, Certificate Revocation: Mechanics and Meaning, Advances in Cryptology: Proceedings of Financial Cryptography '98, R. Hirschfeld, ed., Lecture Notes in Computer Science 1465, Springer-Verlag, NY (1998).

B. Fox and B. LaMacchia, Cooperative Security: A Model for the New Enterprise, Proceedings of the Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '98), Stanford, CA, June 1998, 314-319.

M. Franklin and R. Wright, Secure communication in minimal connectivity models. To appear in Advances in Cryptology -- Eurocrypt '98 Proceedings.

R. Friedman, E. Biham, A. Itzkovitz, and A. Schuster, Symphony: Managing Virtual Servers in the Global Village Technical Reports of the Computer Science Department in the Technion, 0939.

J. Garay and Y. Moses, Fully Polynomial Byzantine Agreement for n>3t Processors in t+1 Rounds, SIAM J. of Computing, 1998.

G. Gaskell, P. Ashley, M. Vandenwauver, and J. Claessens, Intranet Security Technologies - SESAME or SSL?, Proceedings of the Australian Unix and Open Systems User Group National Conference (AUUG98), 1998, pp. 133-142.

R. Gennaro, M. Rabin, and T. Rabin, Simplified VSS and Fast-track Multiparty Computations with Applications to Threshold Cryptography, Proceedings of the 1998 ACM Symposium on Principles of Distributed Computing.

R. Gennaro, D. Micciancio, and T. Rabin, An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products, Proceedings of the Fifth ACM Conference on Computer and Communications Security, 1998, to appear.

Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, Protecting Data Privacy in Private Information Retrieval Schemes, STOC 98.

H. Gilbert, D. Gupta, A. Odlyzko, and J.-J. Quisquater, Attacks on Shamir's 'RSA for paranoids', Information Processing Letters (1998), to appear.

T. Gilmont, J.-D. Legat, and J.-J. Quisquater, An Architecture of Security Management Unit for Safe Hosting of Multiple Agents, International Workshop on Intelligent Communications and Multimedia Terminals (COST#254), Ljubljana, pp. 79-82, Nov. 1998.

O. Goldreich and M. Sudan, Computational Indistinguishability: A Sample Hierarchy; March 1998.

O. Goldreich, A. Sahai, and S. Vadhan, Honest-Verifier Statistical Zero-Knowledge Equals General Statistical Zero-Knowledge; 1998.

L. Gong and R. Schemers, Signing, Sealing, and Guarding Java Objects, Lecture Notes in Computer Science (LNCS), Vol.1419, Springer-Verlag, June 1998.

S. Hada, and T. Tanaka, On the Existence of 3-Round Zero-Knowledge Protocols, CRYPTO'98.

S. Halevi and H. Krawczyk, Public-key cryptography and password protocols, Proceedings of the Fifth ACM Conference on Computer and Communications Security, 1998, to appear.

D. Hamer, M2114: A Naval Enigma, Cryptologia, Vol.XXII(3), July 1998, p.130.

D. Hamer, G. Sullivan, and F. Weierud, Enigma Variations: An Extended Family of Machines, Cryptologia Vol.XXII(3), July 1998, pp 211-229.

G. Hanaoka, Y. Zheng, and H. Imai, LITESET: a Light-Weight Secure Electronic Transaction Protocol; Information Security and Privacy --- ACISP'98, Lecture Notes in Computer Science, Vol. xxxx, pp. xxx-xxx, Springer-Verlag, 1998.

J. Hastad, R. Impagliazzo, L. Levin, and M. Luby, A Pseudorandom generator from any one-way function, SIAM J. on Computing.

H. Handschuh and H. Heys, A Timing Attack on RC5, Workshop on Selected Areas in Cryptography, Springer-Verlag, 1998.

G. Horn, B. Preneel, Authentication and payment in future mobile systems, Proceedings ESORICS '98, LNCS 1485, J.-J. Quisquater, Y. Deswarte, C. Meadows, D. Gollmann, Eds., Springer-Verlag, 1998, pp. 277-293.

A. Iyengar, R. Cahn, C. Jutla, and J. Garay, Design and Implementation of a Secure Distributed Data Repository, IFIP Security, 1998.

T. Jakobsen, Cryptanalysis of Block Ciphers with Probabilistic Non-Linear Relations of Low Degree, Crypto'98, in Hugo Krawczyk, editor, Lecture Notes in Computer Science 1462, Springer, 1998.

M. Jakobsson and D. M'Raïhi, Mix-based Electronic Payments, Fifth Annual Workshop on Selected Areas in Cryptography, 1998.

M. Jakobsson and A. Juels, X-cash: Executable Digital Cash, To appear in Financial Cryptography '98.

M. Jakobsson, Curbing Junk E-Mail via Secure Classification; Financial Cryptography '98

M. Jakobsson, A Practical Mix, Eurocrypt '98.

M. Jakobsson, On Assurance Structures for WWW Commerce; preliminary version, Financial Cryptography '98

M. Jakobsson, E. Shriver, B. Hillyer, and A. Juels, A Practical Secure Physical Random Bit Generator, ACM Security 1998.

N. Johnson and S. Jajodia, Exploring Steganography: Seeing the unseen, IEEE Computer, Vol. 31, No. 2, February 1998, pp. 26-34.

M. Joye and S.-M. Yen, ID-based secret-key cryptography. ACM Operating Systems Review, 32(4):33-39, October 1998. (Gzipped PostScript)

M. Joye and J.-J. Quisquater, Cryptanalysis of RSA-type cryptosystems: a visit, Network Threats, R. N. Wright and P. G. Neumann, eds, 2-4th December 1996, v. 38 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, pp. 21-31, American Mathematical Society, 1998.

M. Joye and S.-M. Yen, Secure evaluation of modular functions, Technical Report TR-98-3, Tamkang LCIS, Tamsui, March 1998.

M. Joye, On the difficulty of coalition-resistance in group signature schemes (I), Technical Report TR-98-17B, Tamkang LCIS, Tamsui, November 1998.

M. Joye, J.-J. Quisquater, and S.-M. Yen, Two protocol attacks on Okamoto and Uchiyama's cryptosystem, Technical Report TR-98-8B, Tamkang LCIS, Tamsui, July 1998.

M. Joye and J.-J. Quisquater, Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams; Designs, Codes and Cryptography, Vol. 14, pp. 53-56, 1998.

A. Juels and M. Peinado, Hiding Cliques for Cryptographic Security, Proceedings of the ninth annual ACM-SIAM Symposium on Discrete Algorithms, ACM Press, January 1998.

M. Just, Some Timestamping Protocol Failures; To appear at the Internet Society Symposium on Network and Distributed System Security, San Diego, CA, Mar 11-13, 1998

S. Kim, S. Oh, S. Park, and D. Won, Cryptanalysis and Enhancement of Saeednia's Key-Exchange Protocols, Proceeding of KICS'98, Korean Institute of Communication Sciences Summer Conference, Vol.17/No.2, 1998, pp. 1001--1004.

S. Kim, S.H. Oh, K.K. Kim, and D. Won, One-Time Self-Certified Public Keys, Revisited, Proc. of ICISC'98, International Conference on Information Security and Cryptology, Vol.1/No.1, 1998, pp.59-69 ; ISBN 89-85305-14-X.

S. Kim, S. Park, and D. Won, Group Signatures for Hierarchical Multigroups, Proc. of ISW'97, Information Security Workshop, Springer, Lecture Notes in Computer Science, LNCS 1396, 1998, pp. 273-281.

L. Knudsen and E. Biham, Cryptanalysis of the ANSI X9.52 CBCM Mode, Advances in Cryptology - EuroCrypt'98, LNCS, Springer Verlag, 1998, to appear.

M. Kuhn and R. Anderson, Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations, in David Aucsmith (Ed.): Information Hiding, Second International Workshop, IH'98, Portland, Oregon, USA, April 15-17, 1998, Proceedings, LNCS 1525, Springer-Verlag, pp. 124-142, ISBN 3-540-65386-4.

M. Kuhn and R. Anderson, Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations, Second Workshop on Information Hiding, Portland, Oregon, USA, Apr. 15-17, 1998.

Markus G. Kuhn, Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP, IEEE Transactions on Computers, Vol. 47, No. 10, October 1998, pp. 1153-1157.

K. Kurosawa and Y. Desmedt, Optimum traitor tracing and new direction for asymmetricity, Advances in Cryptology - EUROCRYPT '98, LNCS 1403, 1998, pp. 145-157.

K. Kurosawa, Unconditionally secure entity authentication, Proceedings of IEEE ISIT'98, p. 298, 1998. Also available in a long version.

K. Kurosawa and W. Ogata, Efficient Rabin-type Digital Signature Scheme, Designs, Codes and Cryptography, to appear.

K. Kurosawa, T. Yoshida, Y. Desmedt, and M. Burmester, Some Bounds and a Construction for Secure Broadcast Encryption, Advances in Cryptology - ASIACRYPT'98, LNCS 1514, 1998, pp. 420-333.

K. Kurosawa, K. Okada, H. Saido, and D. Stinson, New combinatorial bounds for authentication codes and key predistribution schemes, Designs, Codes and Cryptography, v.15, no.1, 1998, pp. 87-100.

E. Kushilevitz and A. Rosén, A Randomness-Rounds Tradeoff in Private Computation, SIDMA 11(1), 1998, pp. 61-80. Early version: Crypto 94.

B. LaMacchia, Policy in Public Key Infrastructures, or How Values End Up in the Code, DIMACS Workshop on Design for Values: Ethical, Social and Political Dimensions of Information Technology (position paper for invited talk), Princeton, NJ, March 1998.

H. Lipmaa, IDEA: A Cipher for Multimedia Architectures?, Stafford Tavares and Henk Meijer, eds., Selected Areas in Cryptography '98, volume 1556 of Lecture Notes in Computer Science, pages 248--263, Kingston, Canada, 17-18 August 1998. Springer-Verlag.

M. Luby and J. Staddon, Combinatorial Bounds for Broadcast Encryption, Eurocrypt, June 1-4, 1998, to appear.

H. Luiijf, A. Dey, J. Watson, C. Muckenhirn , and M. Garnsey, Fortezza-enabled Multi-level Sensitive Simulations, The 1998 Spring Simulation Interoperability Workshop, Position Papers, Volume I, March 9-13, 1998, pp. 119-132.

D. Malkhi, M. Reiter, and A. Rubin, Secure Execution of Java Applets using a Remote Playground; Proc. IEEE Symposium on Security and Privacy (May, 1998).

W. Mao, C. Lim, Cryptanalysis of subgroups of Z*n, Advances in Cryptology, ASIACRYPT'98, LNCS 1514, Springer Verlag, October 1998, pp. 214-216.

W. Mao, Necessity and Realization of universally verifiable secret sharing, To appear in 1998 IEEE Symposium on Security and Privacy. Oakland, CA, May 1998.

W. Mao, Verifiable partial sharing of integer factors, Selected Areas of Cryptography '98, Springer-Verlag, August 1998.

K. Martin, B. Preneel, C. Mitchell, H. Hitz, G. Horn, A. Poliakova, and P. Howard, Secure billing for mobile information services in UMTS, 5th International Conference in Services and Networks, IS&N'98, LNCS 1430, Springer-Verlag, 1998, pp. 535-548.

K. Matsuura, Y. Zheng, and H. Imai, Compact and Flexible Resolution of CBT Multicast Key-Distribution; Proceedings of the Second International Conference on Worldwide Computing and Its Applications (WWCA'98), Lecture Notes in Computer Science, Vol. 1368, pp. 190--205, Springer-Verlag, 1998.

C. Meadows and P. Syverson, A Formal Specification of Requirements for Payment Transactions in the SET Protocol [figures], DRAFT for Preproceedings of Financial Cryptography 98, Anguilla, BWI, Feb. 23-26, 1998.

M. Mihaljevic, Y. Zheng, and H. Imai, A Fast Cryptographic Hash Function Based on Linear Cellular Automata over GF(q); Proceedings of the IFIP 14th International Information Security Conference (IFIP/SEC'98), Chapman & Hall, September 1998, Vienna, Austria. (to appear)

M. Mihaljevic, Y. Zheng, and H. Imai, A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation; Public Key Cryptography --- Proceedings of PKC'98, Lecture Notes in Computer Science, Vol. 1431, pp. xxx-xxx, Springer-Verlag, 1998.

M. Naor and K. Nissim, Certificate Revocation and Certificate Update; 7th USENIX Security Symposium, 1998.

M. Naor and B. Pinkas, Secure and Efficient Metering; Eurocrypt 98.

P. Nguyen and J. Stern, Cryptanalysis of the Ajtai-Dwork Cryptosystem, Advances in Cryptology -- Proceedings of CRYPTO '98, vol. 1462 of LNCS, Springer-Verlag, pp. 223-242.

P. Nguyen and J. Stern, Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97, Proc. of SAC '98.

P. Nguyen and J. Stern, The Beguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure, Advances in Cryptology - Proceedings of ASIACRYPT '98, vol. 1514 of LNCS, Springer-Verlag, pp 372-379.

P. Nikander and L. Viljanen, Storing and Retrieving Internet Certificates, Proceedings of the NORDSEC'98 (The Third Nordic Workshop on Secure IT Systems), Nov. 5-6 1998, Trondheim, Norway.

W. Ogata and K. Kurosawa, Some Basic Properties of General Nonperfect Secret Sharing Schemes, Journal of Universal Computer Science, Vol. 4, No. 8, 1998, 690-704

S. Oh, S. Kim, and D. Won, On the security of cryptographic techniques based on D.L.P., Proc. of KIPS'98, Korea Information Processing Society Fall Conference, Vol.5/No.2, 1998, pp.745-748.

J. Patarin, L. Goubin, and N. Courtois, Improved Algorithms for Isomorphisms of Polynomials, Proceedings of EUROCRYPT'98, Springer, Lecture Notes in Computer Science, Vol. 1403, May 1998, pp. 184-200.

J. Patarin, L. Goubin, and N. Courtois, C*-+ and HM: Variations around two schemes of T. Matsumoto and H. Imai, Proceedings of ASIACRYPT'98, Springer, Lecture Notes in Computer Science, Vol. 1514, October 1998, pp. 35-49.

H. Petersen and M. Michels, Cryptanalysis and improvement of signcryption schemes; IEE Computers and Digital Communications, Vol. 145, No. 2, (1998), Seite 149 - 151.

H. Petersen, A. Herrigel, J. O'Ruanaidh, S. Pereira, and T. Pun, Secure Copyright Protection Techniques for Digital Images; Proc. Workshop on Information Hiding, April, (1998), 12 Seiten, erscheint in LNCS, Springer.

F. Petitcolas and K. Zhang, WebGroup: a secure group access control tool for the world wide web, IEEE Seventh International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE '98, June 17-19, 1998, Stanford University, California, USA.

F. Petitcolas, R. Anderson, and M. Kuhn, Attacks on Copyright Marking Systems, presented at the Second Workshop on Information Hiding, Portland, Oregon, USA, 14--17 April, 1998.

B. Pfitzmann, M. Schunter, and M. Waidner, Optimal Efficiency of Optimistic Contract Signing; to appear in 17th Symposium on Principles of Distributed Computing (PODC), ACM, New York 1998.

B. Preneel, V. Rijmen, and A. Bosselaers, Recent developments in the design of conventional cryptographic algorithms, Computer Security and Industrial Cryptography, State of the Art and Evolution, LNCS 1528, B. Preneel, R. Govaerts, J. Vandewalle, Eds., Springer-Verlag, 1998, pp. 106-131.

M. Reiter and A. Rubin, Crowds: Anonymity for Web Transactions; ACM Transactions on Information and System Security, (April, 1998).

R. Rivest, Can We Eliminate Revocation Lists?; To appear in the Proceedings of Financial Cryptography 1998.

R. Rivest, Chaffing and Winnowing: Confidentiality without Encryption, MIT Lab for Computer Science, March 18, 1998 (rev. April 24, 1998)

C. Schnorr and S. Vaudenay, The Black-Box Model for Cryptographic Primitives, Journal of Cryptology, vol.11, pp. 125-140, 1998.

V. Shoup, Why chosen ciphertext security matters, Preprint, 1998.

V. Shoup and R. Cramer, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack; May 1998.

V. Shoup and E. Kaltofen, Subquadratic-time factorization of polynomials over finite fields; in Proc. 27th ACM Symposium on Theory of Computation, 1995; to appear, Mathematics of Computation, 1998.

M. Skala, A Limited-Diffusion Algorithm for Blind Substring Search, Proceedings of the 10th Annual Canadian Information Technology Security Symposium, 1-5 June 1998, Ottawa, Ontario, pp. 397-410.

Y. Tsiounis, Security proofs for practical encryption schemes; invited presentation at Lucent Technologies, Bell Labs, April 17, 98. For a technical view, refer to the paper published in PKC '98 on ElGamal encryption.

Y. Tsiounis, Fast A-Key distribution with OTASP; presented in the January '97 AHAG meeting, January 8th, '98, New Orleans, LA. The related paper has been accepted in the IEEE Symposium of Security and Privacy

Y. Tsiounis, Y. Frankel, and A. Chan, Easy come-easy go divisible cash; (updated version, GTE Tech report) Eurocrypt '98, Lecture Notes in Computer Science, Elsinki, Finland, May 31-June 4 '98. pp. 561-575.

Y. Tsiounis and M. Yung, On the security of ElGamal-based encryption, to appear in 1998 International Workshop on Practice and Theory in Public Key Cryptography (PKC '98), February 5-6, Yokohama, Japan.

Y. Tsiounis, Y. Frankel, and C. Carroll, Efficient key distribution for slow computing devices: Achieving fast over-the-air activation for wireless systems; To appear in IEEE Symposium on Security and Privacy (S&P '98), May 3-6 '98, Oakland, CA.

B. Van Rompay, L. Knudsen, and V. Rijmen, Differential cryptanalysis of the ICE encryption algorithm, Fast Software Encryption 98, LNCS 1372 , S. Vaudenay, Ed., Springer-Verlag, 1998, pp. 270-283.

R. Wright, D. Shifflett, and C. Irvine, Security for a Virtual Heterogeneous Machine, Proceedings of the Fourteenth Computer Security Applications Conference, 1998, pp. 167--177.

T. Wu, The Secure Remote Password Protocol, 1998 ISOC Network and Distributed Systems Security Symposium, March 1998, pp. 97-111.

C.H. You, J. Zhou, and K.Y. Lam, On the Efficient Implementation of Fair Non-repudiation, Computer Communication Review, 28(5):50--60, ACM Press, October 1998.

X. Zhang, Y. Zheng, and H. Imai, Connections between Nonlinearity and Restrictions, Terms and Hypergraphs of Boolean Functions; Proceedings of 1998 IEEE International Symposium on Information Theory, IEEE Press, August 1998, MIT, Boston. (to appear)

Y. Zheng and H. Imai, Efficient Signcryption Schemes On Elliptic Curves; Proceedings of the IFIP 14th International Information Security Conference (IFIP/SEC'98), Chapman & Hall, September 1998, Vienna, Austria. (to appear)

Y. Zheng and H. Imai, Compact and Unforgeable Key Establishment over an ATM Network; Proceedings of IEEE INFOCOM'98 , 29/3-3/4 1998, San Francisco. (Full paper available on request.)

J. Zhou and D. Gollmann, Towards Verification of Non-repudiation Protocols, Proceedings of 1998 International Refinement Workshop and Formal Methods Pacific, pages 370--380, Canberra, Australia, September 1998, Springer.

J. Zhou and K.Y. Lam, Undeniable Billing in Mobile Communication, Proceedings of 4th ACM/IEEE International Conference on Mobile Computing and Networking, pages 284--290, Dallas, Texas, October 1998, ACM Press.