Conferences in DBLP
Rainer A. Rueppel Key Agreements Based on Function Composition. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:3-10 [Conf ] Kenji Koyama , Kazuo Ohta Security of Improved Identity-Based Conference Key Distribution Systems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:11-19 [Conf ] Yvo Desmedt Subliminal-Free Authentication and Signature (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:23-33 [Conf ] Gustavus J. Simmons , George B. Purdy Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:35-49 [Conf ] Ernest F. Brickell , Douglas R. Stinson Authentication Codes with Multiple Arbiters (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:51-55 [Conf ] Marijke De Soete Some Constructions for Authentication-Secrecy Codes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:57-75 [Conf ] Thomas Beth Efficient Zero-Knowledge Identification Scheme for Smart Cards. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:77-84 [Conf ] Hans-Joachim Knobloch A Smart Card Implementation of the Fiat-Shamir Identification Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:87-95 [Conf ] Philippe Godlewski , Paul Camion Manipulations and Errors, Detection and Localization. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:97-106 [Conf ] Svein J. Knapskog Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:107-122 [Conf ] Louis C. Guillou , Jean-Jacques Quisquater A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:123-128 [Conf ] Marc Girault , Robert Cohen , Mireille Campana A Generalized Birthday Attack. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:129-156 [Conf ] Gordon B. Agnew , Ronald C. Mullin , Scott A. Vanstone An Interactive Data Exchange Protocol Based on Discrete Exponentiation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:159-166 [Conf ] Jørgen Brandt , Ivan Damgård , Peter Landrock Anonymous and Verifiable Registration in Databases. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:167-176 [Conf ] David Chaum Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:177-182 [Conf ] George I. Davida , Yvo Desmedt Passports and Visas Versus IDS (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:183-188 [Conf ] Harald Niederreiter The Probabilistic Theory of Linear Complexity. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:191-209 [Conf ] Adina di Porto , Piero Filipponi A Probabilistic Primality test Based on the Properties of Certain Generalized Lucas Numbers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:211-223 [Conf ] Claus-Peter Schnorr On the Construction of Random Number Generators and Random Function Generators. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:225-232 [Conf ] James A. Davis , Diane B. Holdridge Factorization of Large Integers on a Massively Parallel Computer. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:235-243 [Conf ] Shin-ichi Kawamura , Kyoko Hirano A Fast Modular Arithmetic Algorithm Using a Residue Table (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:245-250 [Conf ] Gordon B. Agnew , Ronald C. Mullin , Scott A. Vanstone Fast Exponentiation in GF(2^{n} ) . [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:251-255 [Conf ] Frank Hoornaert , Marc Decroos , Joos Vandewalle , René Govaerts Fast RSA-Hardware: Dream or Reality? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:257-264 [Conf ] Raouf N. Gorgui-Naguib , Satnam Singh Dlay Properties of the Euler Totient Function Modulo 24 and Some of its Cryptographic Implications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:267-274 [Conf ] Pil Joong Lee , Ernest F. Brickell An Observation on the Security of McEliece's Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:275-280 [Conf ] Brigitte Vallée , Marc Girault , Philippe Toffin How to Break Okamoto's Cryptosystem by Reducing Lattice Bases. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:281-291 [Conf ] Bert den Boer Cryptanalysis of F.E.A.L. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:293-299 [Conf ] Willi Meier , Othmar Staffelbach Fast Correltaion Attacks on Stream Ciphers (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:301-314 [Conf ] Shu Tezuka A New Class of Nonlinear Functions for Running-key Generators (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:317-324 [Conf ] Ben J. M. Smeets , William G. Chambers Windmill Generators: A Generalization and an Observation of How Many There Are. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:325-330 [Conf ] William G. Chambers , Dieter Gollmann Lock-In Effect in Cascades of Clock-Controlled Shift-Registers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:331-343 [Conf ] Cunsheng Ding Proof of Massey's Conjectured Algorithm. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:345-349 [Conf ] Dongdai Lin , Mulan Liu Linear Recurring m-Arrays. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:351-357 [Conf ] Eiji Okamoto Substantial Number of Cryptographic Keys and Its Application to Encryption Designs. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:361-373 [Conf ] Andrea Sgarro A Measure of Semiequivocation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:375-387 [Conf ] Marijke De Soete , Klaus Vedder Some New Classes of Geometric Threshold Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:389-401 [Conf ] C. G. Günther A Universal Algorithm for Homophonic Coding. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:405-414 [Conf ] He Jingmin , Lu Kaicheng A New Probabilistic Encryption Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:415-418 [Conf ] Tsutomu Matsumoto , Hideki Imai Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:419-453 [Conf ] Colin Boyd Some Applications of Multiple Key Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:455-467 [Conf ]