Conferences in DBLP
Carlo Blundo , Alfredo De Santis , Douglas R. Stinson , Ugo Vaccaro Graph Decompositions and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:1-24 [Conf ] Yair Frankel , Yvo Desmedt Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:25-34 [Conf ] Thierry Baritaud , Henri Gilbert , Marc Girault FFT Hashing is not Collision-free. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:35-44 [Conf ] Claus-Peter Schnorr FFT-Hash II, Efficient Cryptographic Hashing. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:45-54 [Conf ] Xuejia Lai , James L. Massey Hash Function Based on Block Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:55-70 [Conf ] Thomas A. Berson Differential Cryptanalysis Mod 2^32 with Applications to MD5. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:71-80 [Conf ] Mitsuru Matsui , Atsuhiro Yamagishi A New Method for Known Plaintext Attack of FEAL Cipher. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:81-91 [Conf ] Kaisa Nyberg On the Construction of Highly Nonlinear Permutations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:92-98 [Conf ] Ralph Wernsdorf The One-Round Functions of the DES Generate the Alternating Group. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:99-112 [Conf ] Jovan Dj. Golic Correlation via Linear Sequential Circuit Approximation of Combiners with memory. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:113-123 [Conf ] Miodrag J. Mihaljevic , Jovan Dj. Golic Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:124-137 [Conf ] Luke O'Connor , Tim Snider Suffix Tree and String Complexity. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:138-152 [Conf ] Birgit Pfitzmann , Michael Waidner Attacks on Protocols for Server-Aided RSA Computation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:153-162 [Conf ] Greg Harper , Alfred Menezes , Scott A. Vanstone Public-Key Cryptosystems with Very Small Key Length. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:163-173 [Conf ] Jörg Sauerbrey , Andreas Dietel Resource Requirements for the Application of Addition Chains in Modulo Exponentiation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:174-182 [Conf ] Brandon Dixon , Arjen K. Lenstra Massively Parallel Elliptic Curve Factorin. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:183-193 [Conf ] Yvo Desmedt , Peter Landrock , Arjen K. Lenstra , Kevin S. McCurley , Andrew M. Odlyzko , Rainer A. Rueppel , Miles E. Smid The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:194-199 [Conf ] Ernest F. Brickell , Daniel M. Gordon , Kevin S. McCurley , David Bruce Wilson Fast Exponentiation with Precomputation (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:200-207 [Conf ] Michael J. Beller , Yacov Yacobi Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:208-220 [Conf ] Keiichi Iwamura , Tsutomu Matsumoto , Hideki Imai High-Speed Implementation Methods for RSA Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:221-238 [Conf ] Ueli M. Maurer A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:239-255 [Conf ] Jacques Patarin How to Construct Pseudorandom and Super Pseudorandom Permutations from one Single Pseudorandom Function. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:256-266 [Conf ] Babak Sadeghiyan , Josef Pieprzyk A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:267-284 [Conf ] Donald Beaver How to Break a "Secure" Oblivious Transfer Protocol. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:285-296 [Conf ] Paul Barbaroux Uniform Results in Polynomial-Time Security. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:297-306 [Conf ] Donald Beaver , Stuart Haber Cryptographic Protocols Provably Secure Against Dynamic Adversaries. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:307-323 [Conf ] Kazuo Ohta , Tatsuaki Okamoto , Atsushi Fujioka Secure Bit Commitment Function against Divertibility. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:324-340 [Conf ] Ivan Damgård Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:341-355 [Conf ] Ingrid Biehl , Johannes Buchmann , Bernd Meyer , Christian Thiel , Christoph Thiel Tools for Proving Zero Knowledge. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:356-365 [Conf ] Eugène van Heyst , Torben P. Pedersen How to Make Efficient Fail-stop Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:366-377 [Conf ] Jan-Hendrik Evertse , Eugène van Heyst Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:378-389 [Conf ] David Chaum , Torben P. Pedersen Transferred Cash Grows in Size. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:390-407 [Conf ] Harald Niederreiter , Claus-Peter Schnorr Local Randomness in Candidate One-Way Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:408-419 [Conf ] Tatsuaki Okamoto , Kouichi Sakurai , Hiroki Shizuya How Intractable Is the Discrete Logarithm for a General Finite Group? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:420-428 [Conf ] Ueli M. Maurer Factoring with an Oracle. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:429-436 [Conf ] Rafi Heiman Secure Audio Teleconferencing: A Practical Solution. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:437-448 [Conf ] Kenji Koyama Secure Conference Key Distribution Schemes for Conspiracy Attack. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:449-453 [Conf ] Rafi Heiman A Note on Discrete Logorithms with Special Structure. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:454-457 [Conf ] Ueli M. Maurer , Yacov Yacobi A Remark on a Non-interactive Public-Key Distribution System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:458-460 [Conf ] Lidong Chen , Ivan Damgård Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:461-466 [Conf ] Andrea Sgarro Information-Theoretic Bounds for Authentication Frauds. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:467-471 [Conf ] Jovan Dj. Golic , Slobodan V. Petrovic A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:472-476 [Conf ] Keiichi Iwamura , Tsutomu Matsumoto , Hideki Imai Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:477-481 [Conf ] Gordon B. Agnew , Ronald C. Mullin , Scott A. Vanstone On the Development of a Fast Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:482-487 [Conf ] David Naccache A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:488-491 [Conf ]