The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
1994 (conf/eurocrypt/94)

  1. Moni Naor, Adi Shamir
    Visual Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:1-12 [Conf]
  2. László Csirmaz
    The Size of a Share Must Be Large. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:13-22 [Conf]
  3. Marten van Dijk
    A Linear Construction of Perfect Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:23-34 [Conf]
  4. Carlo Blundo, Antonio Giorgio Gaggia, Douglas R. Stinson
    On the Dealer's Randomness Required in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:35-46 [Conf]
  5. Claus-Peter Schnorr, Serge Vaudenay
    Black Box Cryptoanalysis of Hash Networks Based on Multipermutations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:47-57 [Conf]
  6. Antoine Joux, Louis Granboulan
    A Practical Attack against Knapsack based Hash Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:58-66 [Conf]
  7. Matthew K. Franklin, Moti Yung
    The Blinding of Weak Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:67-76 [Conf]
  8. David Naccache, David M'Raïhi, Serge Vaudenay, Dan Raphaeli
    Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:77-85 [Conf]
  9. David Chaum
    Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:86-91 [Conf]
  10. Mihir Bellare, Phillip Rogaway
    Optimal Asymmetric Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:92-111 [Conf]
  11. Glenn A. Orton
    A Multiple-Iterated Trapdoor for Dense Compact Knapsacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:112-130 [Conf]
  12. Florent Chabaud
    On the Security of Some Cryptosystems Based on Error-correcting Codes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:131-139 [Conf]
  13. Lidong Chen, Ivan Damgård, Torben P. Pedersen
    Parallel Divertibility of Proofs of Knowledge (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:140-155 [Conf]
  14. Stefano D'Amiano, Giovanni Di Crescenzo
    Methodology for Digital Money based on General Cryptographic Tools. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:156-170 [Conf]
  15. Lidong Chen, Torben P. Pedersen
    New Group Signature Schemes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:171-181 [Conf]
  16. Kaisa Nyberg, Rainer A. Rueppel
    Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:182-193 [Conf]
  17. Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
    Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:194-204 [Conf]
  18. Willi Meier, Othmar Staffelbach
    The Self-Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:205-214 [Conf]
  19. Mark Goresky, Andrew Klapper
    Feedback Registers Based on Ramified Extensions of the 2-Adic Numbers (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:215-222 [Conf]
  20. Rainer Göttfert, Harald Niederreiter
    General Lower Bound for the Linear Complexity of the Product of Shift-Register Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:223-229 [Conf]
  21. Jovan Dj. Golic, Luke O'Connor
    Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:230-243 [Conf]
  22. Richard Taylor
    Near Optimal Unconditionally Secure Authentication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:244-253 [Conf]
  23. Reihaneh Safavi-Naini, L. Tombak
    Authentication Codes in Plaintext and Chosen-content Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:254-265 [Conf]
  24. Christian Cachin, Ueli M. Maurer
    Linking Information Reconciliation and Privacy Amplification (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:266-274 [Conf]
  25. Mike Burmester, Yvo Desmedt
    A Secure and Efficient Conference Key Distribution System (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:275-286 [Conf]
  26. Carlo Blundo, Antonella Cresti
    Space Requirements for Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:287-298 [Conf]
  27. Yuliang Zheng
    How to Break and Repair Leighton and Micali's Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:299-305 [Conf]
  28. Tony Eng, Tatsuaki Okamoto
    Single-Term Divisible Electronic Coins. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:306-319 [Conf]
  29. Paul F. Syverson, Catherine Meadows
    Formal Requirements for Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:320-331 [Conf]
  30. Birgit Pfitzmann
    Breaking Efficient Anonymous Channel. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:332-340 [Conf]
  31. Eli Biham
    On Matsui's Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:341-355 [Conf]
  32. Florent Chabaud, Serge Vaudenay
    Links Between Differential and Linear Cryptoanalysis. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:356-365 [Conf]
  33. Mitsuru Matsui
    On Correlation Between the Order of S-boxes and the Strength of DES. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:366-375 [Conf]
  34. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Relationships Among Nonlinear Criteria (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:376-388 [Conf]
  35. Peter de Rooij
    Efficient Exponentiation using Procomputation and Vector Addition Chains. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:389-399 [Conf]
  36. Frank Damm, F.-P. Heider, G. Wambach
    MIMD-Factorisation on Hypercubes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:400-409 [Conf]
  37. Lars R. Knudsen, Xuejia Lai
    New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:410-418 [Conf]
  38. Lars R. Knudsen
    New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:419-424 [Conf]
  39. Markus Jakobsson
    Blackmailing using Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:425-427 [Conf]
  40. Jan Camenisch, Jean-Marc Piveteau, Markus Stadler
    Blind Signatures Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:428-432 [Conf]
  41. Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng
    Comments on Soviet Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:433-438 [Conf]
  42. Kaisa Nyberg
    Linear Approximation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:439-444 [Conf]
  43. Adi Shamir
    Memory Efficient Variants of Public-Key Schemes for Smart Card Applications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:445-449 [Conf]
  44. Renato Menicocci
    A Systematic Attack on Clock Controlled Cascades. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:450-455 [Conf]
  45. Thomas Johansson, Ben J. M. Smeets
    On A²-Codes Including Arbiter's Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:456-460 [Conf]
  46. Eli Biham, Alex Biryukov
    An Improvement of Davies' Attack on DES. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:461-467 [Conf]
  47. Jaroslav Hruby
    Q-Deformed Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:468-472 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002