The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
1988 (conf/eurocrypt/88)

  1. Rainer A. Rueppel
    Key Agreements Based on Function Composition. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:3-10 [Conf]
  2. Kenji Koyama, Kazuo Ohta
    Security of Improved Identity-Based Conference Key Distribution Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:11-19 [Conf]
  3. Yvo Desmedt
    Subliminal-Free Authentication and Signature (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:23-33 [Conf]
  4. Gustavus J. Simmons, George B. Purdy
    Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:35-49 [Conf]
  5. Ernest F. Brickell, Douglas R. Stinson
    Authentication Codes with Multiple Arbiters (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:51-55 [Conf]
  6. Marijke De Soete
    Some Constructions for Authentication-Secrecy Codes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:57-75 [Conf]
  7. Thomas Beth
    Efficient Zero-Knowledge Identification Scheme for Smart Cards. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:77-84 [Conf]
  8. Hans-Joachim Knobloch
    A Smart Card Implementation of the Fiat-Shamir Identification Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:87-95 [Conf]
  9. Philippe Godlewski, Paul Camion
    Manipulations and Errors, Detection and Localization. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:97-106 [Conf]
  10. Svein J. Knapskog
    Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:107-122 [Conf]
  11. Louis C. Guillou, Jean-Jacques Quisquater
    A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:123-128 [Conf]
  12. Marc Girault, Robert Cohen, Mireille Campana
    A Generalized Birthday Attack. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:129-156 [Conf]
  13. Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone
    An Interactive Data Exchange Protocol Based on Discrete Exponentiation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:159-166 [Conf]
  14. Jørgen Brandt, Ivan Damgård, Peter Landrock
    Anonymous and Verifiable Registration in Databases. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:167-176 [Conf]
  15. David Chaum
    Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:177-182 [Conf]
  16. George I. Davida, Yvo Desmedt
    Passports and Visas Versus IDS (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:183-188 [Conf]
  17. Harald Niederreiter
    The Probabilistic Theory of Linear Complexity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:191-209 [Conf]
  18. Adina di Porto, Piero Filipponi
    A Probabilistic Primality test Based on the Properties of Certain Generalized Lucas Numbers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:211-223 [Conf]
  19. Claus-Peter Schnorr
    On the Construction of Random Number Generators and Random Function Generators. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:225-232 [Conf]
  20. James A. Davis, Diane B. Holdridge
    Factorization of Large Integers on a Massively Parallel Computer. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:235-243 [Conf]
  21. Shin-ichi Kawamura, Kyoko Hirano
    A Fast Modular Arithmetic Algorithm Using a Residue Table (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:245-250 [Conf]
  22. Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone
    Fast Exponentiation in GF(2n). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:251-255 [Conf]
  23. Frank Hoornaert, Marc Decroos, Joos Vandewalle, René Govaerts
    Fast RSA-Hardware: Dream or Reality? [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:257-264 [Conf]
  24. Raouf N. Gorgui-Naguib, Satnam Singh Dlay
    Properties of the Euler Totient Function Modulo 24 and Some of its Cryptographic Implications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:267-274 [Conf]
  25. Pil Joong Lee, Ernest F. Brickell
    An Observation on the Security of McEliece's Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:275-280 [Conf]
  26. Brigitte Vallée, Marc Girault, Philippe Toffin
    How to Break Okamoto's Cryptosystem by Reducing Lattice Bases. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:281-291 [Conf]
  27. Bert den Boer
    Cryptanalysis of F.E.A.L. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:293-299 [Conf]
  28. Willi Meier, Othmar Staffelbach
    Fast Correltaion Attacks on Stream Ciphers (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:301-314 [Conf]
  29. Shu Tezuka
    A New Class of Nonlinear Functions for Running-key Generators (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:317-324 [Conf]
  30. Ben J. M. Smeets, William G. Chambers
    Windmill Generators: A Generalization and an Observation of How Many There Are. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:325-330 [Conf]
  31. William G. Chambers, Dieter Gollmann
    Lock-In Effect in Cascades of Clock-Controlled Shift-Registers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:331-343 [Conf]
  32. Cunsheng Ding
    Proof of Massey's Conjectured Algorithm. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:345-349 [Conf]
  33. Dongdai Lin, Mulan Liu
    Linear Recurring m-Arrays. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:351-357 [Conf]
  34. Eiji Okamoto
    Substantial Number of Cryptographic Keys and Its Application to Encryption Designs. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:361-373 [Conf]
  35. Andrea Sgarro
    A Measure of Semiequivocation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:375-387 [Conf]
  36. Marijke De Soete, Klaus Vedder
    Some New Classes of Geometric Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:389-401 [Conf]
  37. C. G. Günther
    A Universal Algorithm for Homophonic Coding. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:405-414 [Conf]
  38. He Jingmin, Lu Kaicheng
    A New Probabilistic Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:415-418 [Conf]
  39. Tsutomu Matsumoto, Hideki Imai
    Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:419-453 [Conf]
  40. Colin Boyd
    Some Applications of Multiple Key Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:455-467 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002