Conferences in DBLP
Bart Preneel , Paul C. van Oorschot MDx-MAC and Building Fast MACs from Hash Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:1-14 [Conf ] Mihir Bellare , Roch Guérin , Phillip Rogaway XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:15-28 [Conf ] Phillip Rogaway Bucket Hashing and its Application to Fast Message Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:29-42 [Conf ] Richard Schroeppel , Hilarie K. Orman , Sean W. O'Malley , Oliver Spatscheck Fast Key Exchange with Elliptic Curve Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:43-56 [Conf ] Philippe Béguin , Jean-Jacques Quisquater Fast Server-Aided RSA Signatures Secure Against Active Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:57-69 [Conf ] Chae Hoon Lim , Pil Joong Lee Security and Performance of Server-Aided RSA Computation Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:70-83 [Conf ] Shai Halevi Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:84-96 [Conf ] Donald Beaver Precomputing Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:97-109 [Conf ] Claude Crépeau , Jeroen van de Graaf , Alain Tapp Committed Oblivious Transfer and Private Multi-Party Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:110-123 [Conf ] Dominic Mayers On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:124-135 [Conf ] Thorsten Theobald How to Break Shamir's Asymmetric Basis. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:136-147 [Conf ] Sangjoon Park , Sangjin Lee , Seung-Cheol Goh On the Security of the Gollmann Cascades. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:148-156 [Conf ] Kazuo Ohta , Shiho Moriai , Kazumaro Aoki Improving the Search Algorithm for the Best Linear Expression. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:157-170 [Conf ] Burton S. Kaliski Jr. , Yiqun Lisa Yin On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:171-184 [Conf ] Silvio Micali , Ray Sidney A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:185-196 [Conf ] Arjen K. Lenstra , Peter Winkler , Yacov Yacobi A Key Escrow System with Warrant Bounds. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:197-207 [Conf ] Joe Kilian , Frank Thomson Leighton Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:208-221 [Conf ] Yair Frankel , Moti Yung Escrow Encryption Systems Visited: Attacks, Analysis and Designs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:222-235 [Conf ] Ross J. Anderson , Roger M. Needham Robustness Principles for Public Key Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:236-247 [Conf ] Jacques Patarin Cryptoanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:248-261 [Conf ] Andrew Klapper , Mark Goresky Cryptoanalysis Based on 2-Adic Rational Approximation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:262-273 [Conf ] Lars R. Knudsen A Key-schedule Weakness in SAFER K-64. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:274-286 [Conf ] Yair Frankel , Moti Yung Cryptoanalysis of the Immunized LL Public Key Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:287-296 [Conf ] Ronald Cramer , Ivan Damgård Secure Signature Schemes based on Interactive Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:297-310 [Conf ] Joe Kilian Improved Efficient Arguments (Preliminary Version). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:311-324 [Conf ] Ivan Damgård , Oded Goldreich , Tatsuaki Okamoto , Avi Wigderson Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:325-338 [Conf ] Amir Herzberg , Stanislaw Jarecki , Hugo Krawczyk , Moti Yung Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:339-352 [Conf ] Amos Beimel , Benny Chor Secret Sharing with Public Reconstruction (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:353-366 [Conf ] G. R. Blakley , Gregory Kabatianskii General Perfect Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:367-371 [Conf ] Bruce Dodson , Arjen K. Lenstra NFS with Four Large Primes: An Explosive Experiment. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:372-385 [Conf ] Daniel Bleichenbacher , Wieb Bosma , Arjen K. Lenstra Some Remarks on Lucas-Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:386-396 [Conf ] Susan K. Langford Threshold DSS Signatures without a Trusted Party. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:397-409 [Conf ] Kaoru Kurosawa , Satoshi Obana , Wakaha Ogata t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:410-423 [Conf ] Dan Boneh , Richard J. Lipton Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:424-437 [Conf ] Tatsuaki Okamoto An Efficient Divisible Electronic Cash Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:438-451 [Conf ] Dan Boneh , James Shaw Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:452-465 [Conf ]