Conferences in DBLP
Moni Naor , Adi Shamir Visual Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:1-12 [Conf ] László Csirmaz The Size of a Share Must Be Large. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:13-22 [Conf ] Marten van Dijk A Linear Construction of Perfect Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:23-34 [Conf ] Carlo Blundo , Antonio Giorgio Gaggia , Douglas R. Stinson On the Dealer's Randomness Required in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:35-46 [Conf ] Claus-Peter Schnorr , Serge Vaudenay Black Box Cryptoanalysis of Hash Networks Based on Multipermutations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:47-57 [Conf ] Antoine Joux , Louis Granboulan A Practical Attack against Knapsack based Hash Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:58-66 [Conf ] Matthew K. Franklin , Moti Yung The Blinding of Weak Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:67-76 [Conf ] David Naccache , David M'Raïhi , Serge Vaudenay , Dan Raphaeli Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:77-85 [Conf ] David Chaum Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:86-91 [Conf ] Mihir Bellare , Phillip Rogaway Optimal Asymmetric Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:92-111 [Conf ] Glenn A. Orton A Multiple-Iterated Trapdoor for Dense Compact Knapsacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:112-130 [Conf ] Florent Chabaud On the Security of Some Cryptosystems Based on Error-correcting Codes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:131-139 [Conf ] Lidong Chen , Ivan Damgård , Torben P. Pedersen Parallel Divertibility of Proofs of Knowledge (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:140-155 [Conf ] Stefano D'Amiano , Giovanni Di Crescenzo Methodology for Digital Money based on General Cryptographic Tools. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:156-170 [Conf ] Lidong Chen , Torben P. Pedersen New Group Signature Schemes (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:171-181 [Conf ] Kaisa Nyberg , Rainer A. Rueppel Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:182-193 [Conf ] Chuan-Ming Li , Tzonelih Hwang , Narn-Yih Lee Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:194-204 [Conf ] Willi Meier , Othmar Staffelbach The Self-Shrinking Generator. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:205-214 [Conf ] Mark Goresky , Andrew Klapper Feedback Registers Based on Ramified Extensions of the 2-Adic Numbers (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:215-222 [Conf ] Rainer Göttfert , Harald Niederreiter General Lower Bound for the Linear Complexity of the Product of Shift-Register Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:223-229 [Conf ] Jovan Dj. Golic , Luke O'Connor Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:230-243 [Conf ] Richard Taylor Near Optimal Unconditionally Secure Authentication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:244-253 [Conf ] Reihaneh Safavi-Naini , L. Tombak Authentication Codes in Plaintext and Chosen-content Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:254-265 [Conf ] Christian Cachin , Ueli M. Maurer Linking Information Reconciliation and Privacy Amplification (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:266-274 [Conf ] Mike Burmester , Yvo Desmedt A Secure and Efficient Conference Key Distribution System (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:275-286 [Conf ] Carlo Blundo , Antonella Cresti Space Requirements for Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:287-298 [Conf ] Yuliang Zheng How to Break and Repair Leighton and Micali's Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:299-305 [Conf ] Tony Eng , Tatsuaki Okamoto Single-Term Divisible Electronic Coins. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:306-319 [Conf ] Paul F. Syverson , Catherine Meadows Formal Requirements for Key Distribution Protocols. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:320-331 [Conf ] Birgit Pfitzmann Breaking Efficient Anonymous Channel. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:332-340 [Conf ] Eli Biham On Matsui's Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:341-355 [Conf ] Florent Chabaud , Serge Vaudenay Links Between Differential and Linear Cryptoanalysis. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:356-365 [Conf ] Mitsuru Matsui On Correlation Between the Order of S-boxes and the Strength of DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:366-375 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Relationships Among Nonlinear Criteria (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:376-388 [Conf ] Peter de Rooij Efficient Exponentiation using Procomputation and Vector Addition Chains. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:389-399 [Conf ] Frank Damm , F.-P. Heider , G. Wambach MIMD-Factorisation on Hypercubes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:400-409 [Conf ] Lars R. Knudsen , Xuejia Lai New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:410-418 [Conf ] Lars R. Knudsen New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:419-424 [Conf ] Markus Jakobsson Blackmailing using Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:425-427 [Conf ] Jan Camenisch , Jean-Marc Piveteau , Markus Stadler Blind Signatures Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:428-432 [Conf ] Chris Charnes , Luke O'Connor , Josef Pieprzyk , Reihaneh Safavi-Naini , Yuliang Zheng Comments on Soviet Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:433-438 [Conf ] Kaisa Nyberg Linear Approximation of Block Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:439-444 [Conf ] Adi Shamir Memory Efficient Variants of Public-Key Schemes for Smart Card Applications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:445-449 [Conf ] Renato Menicocci A Systematic Attack on Clock Controlled Cascades. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:450-455 [Conf ] Thomas Johansson , Ben J. M. Smeets On A²-Codes Including Arbiter's Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:456-460 [Conf ] Eli Biham , Alex Biryukov An Improvement of Davies' Attack on DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:461-467 [Conf ] Jaroslav Hruby Q-Deformed Quantum Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:468-472 [Conf ]