The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1996 (conf/crypto/1996)

  1. Mihir Bellare, Ran Canetti, Hugo Krawczyk
    Keying Hash Functions for Message Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:1-15 [Conf]
  2. Mustafa Atici, Douglas R. Stinson
    Universal Hashing and Multiple Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:16-30 [Conf]
  3. Tor Helleseth, Thomas Johansson
    Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:31-44 [Conf]
  4. Jacques Patarin
    Asymmetric Cryptography with a Hidden Monomial. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:45-60 [Conf]
  5. Daniel R. Simon
    Anonymous Communication and Anonymous Cash. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:61-73 [Conf]
  6. Susan K. Langford
    Weakness in Some Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:74-82 [Conf]
  7. Serge Vaudenay
    Hidden Collisions on DSS. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:83-88 [Conf]
  8. Adam Young, Moti Yung
    The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:89-103 [Conf]
  9. Paul C. Kocher
    Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:104-113 [Conf]
  10. Mats Näslund
    All Bits ax+b mod p are Hard (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:114-128 [Conf]
  11. Dan Boneh, Ramarathnam Venkatesan
    Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:129-142 [Conf]
  12. Claus-Peter Schnorr
    Security of 2^t-Root Identification and Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:143-156 [Conf]
  13. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:157-172 [Conf]
  14. Ronald Cramer, Ivan Damgård
    New Generation of Secure and Practical RSA-Based Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:173-185 [Conf]
  15. Markus Jakobsson, Moti Yung
    Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:186-200 [Conf]
  16. Shai Halevi, Silvio Micali
    Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:201-215 [Conf]
  17. Lars R. Knudsen, Willi Meier
    Improved Differential Attacks on RC5. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:216-228 [Conf]
  18. Paul C. van Oorschot, Michael J. Wiener
    Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:229-236 [Conf]
  19. John Kelsey, Bruce Schneier, David Wagner
    Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:237-251 [Conf]
  20. Joe Kilian, Phillip Rogaway
    How to Protect DES Against Exhaustive Key Search. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:252-267 [Conf]
  21. Ueli M. Maurer, Stefan Wolf
    Diffie-Hellman Oracles. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:268-282 [Conf]
  22. Dan Boneh, Richard J. Lipton
    Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:283-297 [Conf]
  23. Antoon Bosselaers, René Govaerts, Joos Vandewalle
    Fast Hashing on the Pentium. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:298-312 [Conf]
  24. Victor Shoup
    On Fast and Provably Secure Message Authentication Based on Universal Hashing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:313-328 [Conf]
  25. R. J. Hughes, G. G. Luther, G. L. Morgan, C. G. Peterson, C. M. Simmons
    Quantum Cryptography over Underground Optical Fibers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:329-342 [Conf]
  26. Dominic Mayers
    Quantum Key Distribution and String Oblivious Transfer in Noisy Channels. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:343-357 [Conf]
  27. James L. Massey, Shirlei Serconek
    Linear Complexity of Periodic Sequences: A General Theory. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:358-371 [Conf]
  28. Paul Camion, Anne Canteaut
    Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:372-386 [Conf]
  29. Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson
    Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:387-400 [Conf]
  30. Stefan Droste
    New Results on Visual Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:401-415 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002