Conferences in DBLP
Mihir Bellare , Ran Canetti , Hugo Krawczyk Keying Hash Functions for Message Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:1-15 [Conf ] Mustafa Atici , Douglas R. Stinson Universal Hashing and Multiple Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:16-30 [Conf ] Tor Helleseth , Thomas Johansson Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:31-44 [Conf ] Jacques Patarin Asymmetric Cryptography with a Hidden Monomial. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:45-60 [Conf ] Daniel R. Simon Anonymous Communication and Anonymous Cash. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:61-73 [Conf ] Susan K. Langford Weakness in Some Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:74-82 [Conf ] Serge Vaudenay Hidden Collisions on DSS. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:83-88 [Conf ] Adam Young , Moti Yung The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:89-103 [Conf ] Paul C. Kocher Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:104-113 [Conf ] Mats Näslund All Bits ax+b mod p are Hard (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:114-128 [Conf ] Dan Boneh , Ramarathnam Venkatesan Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:129-142 [Conf ] Claus-Peter Schnorr Security of 2^t-Root Identification and Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:143-156 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:157-172 [Conf ] Ronald Cramer , Ivan Damgård New Generation of Secure and Practical RSA-Based Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:173-185 [Conf ] Markus Jakobsson , Moti Yung Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:186-200 [Conf ] Shai Halevi , Silvio Micali Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:201-215 [Conf ] Lars R. Knudsen , Willi Meier Improved Differential Attacks on RC5. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:216-228 [Conf ] Paul C. van Oorschot , Michael J. Wiener Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:229-236 [Conf ] John Kelsey , Bruce Schneier , David Wagner Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:237-251 [Conf ] Joe Kilian , Phillip Rogaway How to Protect DES Against Exhaustive Key Search. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:252-267 [Conf ] Ueli M. Maurer , Stefan Wolf Diffie-Hellman Oracles. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:268-282 [Conf ] Dan Boneh , Richard J. Lipton Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:283-297 [Conf ] Antoon Bosselaers , René Govaerts , Joos Vandewalle Fast Hashing on the Pentium. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:298-312 [Conf ] Victor Shoup On Fast and Provably Secure Message Authentication Based on Universal Hashing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:313-328 [Conf ] R. J. Hughes , G. G. Luther , G. L. Morgan , C. G. Peterson , C. M. Simmons Quantum Cryptography over Underground Optical Fibers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:329-342 [Conf ] Dominic Mayers Quantum Key Distribution and String Oblivious Transfer in Noisy Channels. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:343-357 [Conf ] James L. Massey , Shirlei Serconek Linear Complexity of Periodic Sequences: A General Theory. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:358-371 [Conf ] Paul Camion , Anne Canteaut Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:372-386 [Conf ] Carlo Blundo , Luiz A. Frota Mattos , Douglas R. Stinson Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:387-400 [Conf ] Stefan Droste New Results on Visual Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:401-415 [Conf ]