The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1995 (conf/crypto/1995)

  1. Bart Preneel, Paul C. van Oorschot
    MDx-MAC and Building Fast MACs from Hash Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:1-14 [Conf]
  2. Mihir Bellare, Roch Guérin, Phillip Rogaway
    XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:15-28 [Conf]
  3. Phillip Rogaway
    Bucket Hashing and its Application to Fast Message Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:29-42 [Conf]
  4. Richard Schroeppel, Hilarie K. Orman, Sean W. O'Malley, Oliver Spatscheck
    Fast Key Exchange with Elliptic Curve Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:43-56 [Conf]
  5. Philippe Béguin, Jean-Jacques Quisquater
    Fast Server-Aided RSA Signatures Secure Against Active Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:57-69 [Conf]
  6. Chae Hoon Lim, Pil Joong Lee
    Security and Performance of Server-Aided RSA Computation Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:70-83 [Conf]
  7. Shai Halevi
    Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:84-96 [Conf]
  8. Donald Beaver
    Precomputing Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:97-109 [Conf]
  9. Claude Crépeau, Jeroen van de Graaf, Alain Tapp
    Committed Oblivious Transfer and Private Multi-Party Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:110-123 [Conf]
  10. Dominic Mayers
    On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:124-135 [Conf]
  11. Thorsten Theobald
    How to Break Shamir's Asymmetric Basis. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:136-147 [Conf]
  12. Sangjoon Park, Sangjin Lee, Seung-Cheol Goh
    On the Security of the Gollmann Cascades. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:148-156 [Conf]
  13. Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
    Improving the Search Algorithm for the Best Linear Expression. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:157-170 [Conf]
  14. Burton S. Kaliski Jr., Yiqun Lisa Yin
    On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:171-184 [Conf]
  15. Silvio Micali, Ray Sidney
    A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:185-196 [Conf]
  16. Arjen K. Lenstra, Peter Winkler, Yacov Yacobi
    A Key Escrow System with Warrant Bounds. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:197-207 [Conf]
  17. Joe Kilian, Frank Thomson Leighton
    Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:208-221 [Conf]
  18. Yair Frankel, Moti Yung
    Escrow Encryption Systems Visited: Attacks, Analysis and Designs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:222-235 [Conf]
  19. Ross J. Anderson, Roger M. Needham
    Robustness Principles for Public Key Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:236-247 [Conf]
  20. Jacques Patarin
    Cryptoanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:248-261 [Conf]
  21. Andrew Klapper, Mark Goresky
    Cryptoanalysis Based on 2-Adic Rational Approximation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:262-273 [Conf]
  22. Lars R. Knudsen
    A Key-schedule Weakness in SAFER K-64. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:274-286 [Conf]
  23. Yair Frankel, Moti Yung
    Cryptoanalysis of the Immunized LL Public Key Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:287-296 [Conf]
  24. Ronald Cramer, Ivan Damgård
    Secure Signature Schemes based on Interactive Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:297-310 [Conf]
  25. Joe Kilian
    Improved Efficient Arguments (Preliminary Version). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:311-324 [Conf]
  26. Ivan Damgård, Oded Goldreich, Tatsuaki Okamoto, Avi Wigderson
    Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:325-338 [Conf]
  27. Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
    Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:339-352 [Conf]
  28. Amos Beimel, Benny Chor
    Secret Sharing with Public Reconstruction (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:353-366 [Conf]
  29. G. R. Blakley, Gregory Kabatianskii
    General Perfect Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:367-371 [Conf]
  30. Bruce Dodson, Arjen K. Lenstra
    NFS with Four Large Primes: An Explosive Experiment. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:372-385 [Conf]
  31. Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra
    Some Remarks on Lucas-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:386-396 [Conf]
  32. Susan K. Langford
    Threshold DSS Signatures without a Trusted Party. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:397-409 [Conf]
  33. Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata
    t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:410-423 [Conf]
  34. Dan Boneh, Richard J. Lipton
    Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:424-437 [Conf]
  35. Tatsuaki Okamoto
    An Efficient Divisible Electronic Cash Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:438-451 [Conf]
  36. Dan Boneh, James Shaw
    Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:452-465 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002