Conferences in DBLP
Mitsuru Matsui The First Experimental Cryptanalysis of the Data Encryption Standard. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:1-11 [Conf ] Kazuo Ohta , Kazumaro Aoki Linear Cryptanalysis of the Fast Data Encipherment Algorithm. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:12-16 [Conf ] Susan K. Langford , Martin E. Hellman Differential-Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:17-25 [Conf ] Burton S. Kaliski Jr. , Matthew J. B. Robshaw Linear Cryptanalysis Using Multiple Approximations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:26-39 [Conf ] Jean-Pierre Tillich , Gilles Zémor Hashing with SL_2. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:40-49 [Conf ] Jinhui Chao , Kazuo Tanada , Shigeo Tsujii Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:50-55 [Conf ] Ingrid Biehl , Johannes Buchmann , Christoph Thiel Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:56-60 [Conf ] Tatsuaki Okamoto Designated Confirmer Signatures and Public-Key Encryption are Equivalent. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:61-74 [Conf ] Daniel Bleichenbacher , Ueli M. Maurer Directed Acyclic Graphs, One-way Functions and Digital Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:75-82 [Conf ] Olivier Delos , Jean-Jacques Quisquater An Identity-Based Signature Scheme with Bounded Life-Span. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:83-94 [Conf ] Chae Hoon Lim , Pil Joong Lee More Flexible Exponentiation with Precomputation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:95-107 [Conf ] Tamás Horváth , Spyros S. Magliveras , Tran van Trung A Parallel Permutation Multiplier for a PGM Crypto-chip. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:108-113 [Conf ] Don Davis , Ross Ihaka , Philip Fenstermacher Cryptographic Randomness from Air Turbulence in Disk Drives. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:114-120 [Conf ] Christian Gehrmann Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:121-128 [Conf ] Hugo Krawczyk LFSR-based Hashing and Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:129-139 [Conf ] Kaoru Kurosawa New Bound on Authentication Code with Arbitration. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:140-149 [Conf ] Carlo Blundo , Alfredo De Santis , Giovanni Di Crescenzo , Antonio Giorgio Gaggia , Ugo Vaccaro Multi-Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:150-163 [Conf ] Jacques Stern Designing Identification Schemes with Keys of Short Size. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:164-173 [Conf ] Ronald Cramer , Ivan Damgård , Berry Schoenmakers Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:174-187 [Conf ] Toshiya Itoh , Yuji Ohta , Hiroki Shizuya Language Dependent Secure Bit Commitment. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:188-201 [Conf ] Marc Girault , Jacques Stern On the Length of Cryptographic Hash-Values Used in Identification Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:202-215 [Conf ] Mihir Bellare , Oded Goldreich , Shafi Goldwasser Incremental Cryptography: The Case of Hashing and Signing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:216-233 [Conf ] Cynthia Dwork , Moni Naor An Efficient Existentially Unforgeable Signature Scheme and its Applications. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:234-246 [Conf ] Jürgen Bierbrauer , K. Gopalakrishnan , Douglas R. Stinson Bounds for Resilient Functions and Orthogonal Arrays. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:247-256 [Conf ] Benny Chor , Amos Fiat , Moni Naor Tracing Traitors. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:257-270 [Conf ] Ueli M. Maurer Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Algorithms [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:271-281 [Conf ] Preda Mihailescu Fast Generation of Provable Primes Using Search in Arithmetic Progressions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:282-293 [Conf ] Don Coppersmith Attack on the Cryptographic Scheme NIKS-TAS. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:294-307 [Conf ] Mike Burmester On the Risk of Opening Distributed Keys. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:308-317 [Conf ] Thomas Beth , Dejan E. Lazic , A. Mathias Cryptanalysis of Cryptosystems Based on Remote Chaos Replication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:318-331 [Conf ] James L. Massey , Shirlei Serconek A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:332-340 [Conf ] Mihir Bellare , Joe Kilian , Phillip Rogaway The Security of Cipher Block Chaining. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:341-358 [Conf ] Henri Gilbert , Pascal Chauvaud A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:359-368 [Conf ] Yukiyasu Tsunoo , Eiji Okamoto , Tomohiko Uyematsu Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:369-382 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Pitfalls in Designing Substitution Boxes (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:383-396 [Conf ] Eyal Kushilevitz , Adi Rosén A Randomnesss-Rounds Tradeoff in Private Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:397-410 [Conf ] Kazue Sako , Joe Kilian Secure Voting Using Partially Compatible Homomorphisms. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:411-424 [Conf ] Ran Canetti , Amir Herzberg Maintaining Security in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:425-438 [Conf ]