The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
1992 (conf/eurocrypt/92)

  1. Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro
    Graph Decompositions and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:1-24 [Conf]
  2. Yair Frankel, Yvo Desmedt
    Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:25-34 [Conf]
  3. Thierry Baritaud, Henri Gilbert, Marc Girault
    FFT Hashing is not Collision-free. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:35-44 [Conf]
  4. Claus-Peter Schnorr
    FFT-Hash II, Efficient Cryptographic Hashing. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:45-54 [Conf]
  5. Xuejia Lai, James L. Massey
    Hash Function Based on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:55-70 [Conf]
  6. Thomas A. Berson
    Differential Cryptanalysis Mod 2^32 with Applications to MD5. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:71-80 [Conf]
  7. Mitsuru Matsui, Atsuhiro Yamagishi
    A New Method for Known Plaintext Attack of FEAL Cipher. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:81-91 [Conf]
  8. Kaisa Nyberg
    On the Construction of Highly Nonlinear Permutations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:92-98 [Conf]
  9. Ralph Wernsdorf
    The One-Round Functions of the DES Generate the Alternating Group. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:99-112 [Conf]
  10. Jovan Dj. Golic
    Correlation via Linear Sequential Circuit Approximation of Combiners with memory. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:113-123 [Conf]
  11. Miodrag J. Mihaljevic, Jovan Dj. Golic
    Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:124-137 [Conf]
  12. Luke O'Connor, Tim Snider
    Suffix Tree and String Complexity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:138-152 [Conf]
  13. Birgit Pfitzmann, Michael Waidner
    Attacks on Protocols for Server-Aided RSA Computation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:153-162 [Conf]
  14. Greg Harper, Alfred Menezes, Scott A. Vanstone
    Public-Key Cryptosystems with Very Small Key Length. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:163-173 [Conf]
  15. Jörg Sauerbrey, Andreas Dietel
    Resource Requirements for the Application of Addition Chains in Modulo Exponentiation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:174-182 [Conf]
  16. Brandon Dixon, Arjen K. Lenstra
    Massively Parallel Elliptic Curve Factorin. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:183-193 [Conf]
  17. Yvo Desmedt, Peter Landrock, Arjen K. Lenstra, Kevin S. McCurley, Andrew M. Odlyzko, Rainer A. Rueppel, Miles E. Smid
    The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:194-199 [Conf]
  18. Ernest F. Brickell, Daniel M. Gordon, Kevin S. McCurley, David Bruce Wilson
    Fast Exponentiation with Precomputation (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:200-207 [Conf]
  19. Michael J. Beller, Yacov Yacobi
    Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:208-220 [Conf]
  20. Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
    High-Speed Implementation Methods for RSA Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:221-238 [Conf]
  21. Ueli M. Maurer
    A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:239-255 [Conf]
  22. Jacques Patarin
    How to Construct Pseudorandom and Super Pseudorandom Permutations from one Single Pseudorandom Function. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:256-266 [Conf]
  23. Babak Sadeghiyan, Josef Pieprzyk
    A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:267-284 [Conf]
  24. Donald Beaver
    How to Break a "Secure" Oblivious Transfer Protocol. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:285-296 [Conf]
  25. Paul Barbaroux
    Uniform Results in Polynomial-Time Security. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:297-306 [Conf]
  26. Donald Beaver, Stuart Haber
    Cryptographic Protocols Provably Secure Against Dynamic Adversaries. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:307-323 [Conf]
  27. Kazuo Ohta, Tatsuaki Okamoto, Atsushi Fujioka
    Secure Bit Commitment Function against Divertibility. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:324-340 [Conf]
  28. Ivan Damgård
    Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:341-355 [Conf]
  29. Ingrid Biehl, Johannes Buchmann, Bernd Meyer, Christian Thiel, Christoph Thiel
    Tools for Proving Zero Knowledge. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:356-365 [Conf]
  30. Eugène van Heyst, Torben P. Pedersen
    How to Make Efficient Fail-stop Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:366-377 [Conf]
  31. Jan-Hendrik Evertse, Eugène van Heyst
    Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol? [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:378-389 [Conf]
  32. David Chaum, Torben P. Pedersen
    Transferred Cash Grows in Size. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:390-407 [Conf]
  33. Harald Niederreiter, Claus-Peter Schnorr
    Local Randomness in Candidate One-Way Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:408-419 [Conf]
  34. Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya
    How Intractable Is the Discrete Logarithm for a General Finite Group? [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:420-428 [Conf]
  35. Ueli M. Maurer
    Factoring with an Oracle. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:429-436 [Conf]
  36. Rafi Heiman
    Secure Audio Teleconferencing: A Practical Solution. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:437-448 [Conf]
  37. Kenji Koyama
    Secure Conference Key Distribution Schemes for Conspiracy Attack. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:449-453 [Conf]
  38. Rafi Heiman
    A Note on Discrete Logorithms with Special Structure. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:454-457 [Conf]
  39. Ueli M. Maurer, Yacov Yacobi
    A Remark on a Non-interactive Public-Key Distribution System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:458-460 [Conf]
  40. Lidong Chen, Ivan Damgård
    Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:461-466 [Conf]
  41. Andrea Sgarro
    Information-Theoretic Bounds for Authentication Frauds. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:467-471 [Conf]
  42. Jovan Dj. Golic, Slobodan V. Petrovic
    A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:472-476 [Conf]
  43. Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
    Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:477-481 [Conf]
  44. Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone
    On the Development of a Fast Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:482-487 [Conf]
  45. David Naccache
    A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:488-491 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002