The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1994 (conf/crypto/1994)

  1. Mitsuru Matsui
    The First Experimental Cryptanalysis of the Data Encryption Standard. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:1-11 [Conf]
  2. Kazuo Ohta, Kazumaro Aoki
    Linear Cryptanalysis of the Fast Data Encipherment Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:12-16 [Conf]
  3. Susan K. Langford, Martin E. Hellman
    Differential-Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:17-25 [Conf]
  4. Burton S. Kaliski Jr., Matthew J. B. Robshaw
    Linear Cryptanalysis Using Multiple Approximations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:26-39 [Conf]
  5. Jean-Pierre Tillich, Gilles Zémor
    Hashing with SL_2. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:40-49 [Conf]
  6. Jinhui Chao, Kazuo Tanada, Shigeo Tsujii
    Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:50-55 [Conf]
  7. Ingrid Biehl, Johannes Buchmann, Christoph Thiel
    Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:56-60 [Conf]
  8. Tatsuaki Okamoto
    Designated Confirmer Signatures and Public-Key Encryption are Equivalent. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:61-74 [Conf]
  9. Daniel Bleichenbacher, Ueli M. Maurer
    Directed Acyclic Graphs, One-way Functions and Digital Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:75-82 [Conf]
  10. Olivier Delos, Jean-Jacques Quisquater
    An Identity-Based Signature Scheme with Bounded Life-Span. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:83-94 [Conf]
  11. Chae Hoon Lim, Pil Joong Lee
    More Flexible Exponentiation with Precomputation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:95-107 [Conf]
  12. Tamás Horváth, Spyros S. Magliveras, Tran van Trung
    A Parallel Permutation Multiplier for a PGM Crypto-chip. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:108-113 [Conf]
  13. Don Davis, Ross Ihaka, Philip Fenstermacher
    Cryptographic Randomness from Air Turbulence in Disk Drives. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:114-120 [Conf]
  14. Christian Gehrmann
    Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:121-128 [Conf]
  15. Hugo Krawczyk
    LFSR-based Hashing and Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:129-139 [Conf]
  16. Kaoru Kurosawa
    New Bound on Authentication Code with Arbitration. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:140-149 [Conf]
  17. Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro
    Multi-Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:150-163 [Conf]
  18. Jacques Stern
    Designing Identification Schemes with Keys of Short Size. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:164-173 [Conf]
  19. Ronald Cramer, Ivan Damgård, Berry Schoenmakers
    Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:174-187 [Conf]
  20. Toshiya Itoh, Yuji Ohta, Hiroki Shizuya
    Language Dependent Secure Bit Commitment. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:188-201 [Conf]
  21. Marc Girault, Jacques Stern
    On the Length of Cryptographic Hash-Values Used in Identification Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:202-215 [Conf]
  22. Mihir Bellare, Oded Goldreich, Shafi Goldwasser
    Incremental Cryptography: The Case of Hashing and Signing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:216-233 [Conf]
  23. Cynthia Dwork, Moni Naor
    An Efficient Existentially Unforgeable Signature Scheme and its Applications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:234-246 [Conf]
  24. Jürgen Bierbrauer, K. Gopalakrishnan, Douglas R. Stinson
    Bounds for Resilient Functions and Orthogonal Arrays. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:247-256 [Conf]
  25. Benny Chor, Amos Fiat, Moni Naor
    Tracing Traitors. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:257-270 [Conf]
  26. Ueli M. Maurer
    Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Algorithms [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:271-281 [Conf]
  27. Preda Mihailescu
    Fast Generation of Provable Primes Using Search in Arithmetic Progressions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:282-293 [Conf]
  28. Don Coppersmith
    Attack on the Cryptographic Scheme NIKS-TAS. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:294-307 [Conf]
  29. Mike Burmester
    On the Risk of Opening Distributed Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:308-317 [Conf]
  30. Thomas Beth, Dejan E. Lazic, A. Mathias
    Cryptanalysis of Cryptosystems Based on Remote Chaos Replication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:318-331 [Conf]
  31. James L. Massey, Shirlei Serconek
    A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:332-340 [Conf]
  32. Mihir Bellare, Joe Kilian, Phillip Rogaway
    The Security of Cipher Block Chaining. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:341-358 [Conf]
  33. Henri Gilbert, Pascal Chauvaud
    A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:359-368 [Conf]
  34. Yukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu
    Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:369-382 [Conf]
  35. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Pitfalls in Designing Substitution Boxes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:383-396 [Conf]
  36. Eyal Kushilevitz, Adi Rosén
    A Randomnesss-Rounds Tradeoff in Private Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:397-410 [Conf]
  37. Kazue Sako, Joe Kilian
    Secure Voting Using Partially Compatible Homomorphisms. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:411-424 [Conf]
  38. Ran Canetti, Amir Herzberg
    Maintaining Security in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:425-438 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002