David M'Raïhi, David Naccache Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:58-61 [Conf]
Dominique Bolignano An Approach to the Formal Verification of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:106-118 [Conf]
David M. Goldschlag Several Secure Store and Forward Devices. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:129-137 [Conf]
Serge Vaudenay An Experiment on DES Statistical Cryptanalysis. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:139-147 [Conf]
Hung-Min Sun, Shiuh-Pyng Shieh Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:153-156 [Conf]
Moni Naor, Avishai Wool Access Control and Signatures via Quorum Secret Sharing. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:157-168 [Conf]