Abstract: This is a short survey written to complement my invited talks on this subject, at the ISW 97 conference and the Aarhus Summer school in Cryptography (Denmark, 1998).
Ref: Appears in the Proceedings of First International Workshop on Information Security (ISW 97), Lecture Notes in Computer Science Vol. 1396, E. Okamoto, G. Davida and M. Mambo eds., Springer Verlag, 1998. Also in Lecture Notes in Computer Science Vol. 1561, I. Damgard ed., Springer Verlag, 1999.
Full paper: Available as compressed postscript, postscript, or pdf. ( Help if this doesn't work).