The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
1989 (conf/eurocrypt/89)

  1. Whitfield Diffie
    The Adolescence of Public-Key Cryptography (Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:2- [Conf]
  2. Zvi Galil, Stuart Haber, Moti Yung
    A Secure Public-key Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:3-15 [Conf]
  3. Gilles Brassard
    How to Improve Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:16-22 [Conf]
  4. Walter J. Jaburek
    A Generalization of El Gamal's Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:23-28 [Conf]
  5. Christoph G. Günther
    An Identity-Based Key-Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:29-37 [Conf]
  6. Fritz Bauspieß, Hans-Joachim Knobloch
    How to Keep Authenticity Alive in a Computer Network. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:38-46 [Conf]
  7. Hartmut Isselhorst
    The Use of Fractions in Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:47-55 [Conf]
  8. Yair Frankel
    A Practical Protocol for Large Group Oriented Networks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:56-61 [Conf]
  9. Sheelagh Lloyd
    Counting Functions Satisfying a Higher Order Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:63-74 [Conf]
  10. George I. Davida, Yvo Desmedt, René Peralta
    A Key Distribution System Based On Any One-Way Function (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:75-79 [Conf]
  11. Josef Pieprzyk
    Non-linearity of Exponent Permutations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:80-92 [Conf]
  12. Andrea Sgarro
    Informational Divergence Bounds for Authentication Codes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:93-101 [Conf]
  13. Jean-Jacques Quisquater, Marc Girault
    2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:102-109 [Conf]
  14. Stig Fr. Mjølsnes
    A Simple Technique for Diffusing Cryptoperiods. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:110-120 [Conf]
  15. Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
    A General Zero-Knowledge Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:122-133 [Conf]
  16. Tatsuaki Okamoto, Kazuo Ohta
    Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:134-148 [Conf]
  17. Claude Crépeau
    Verifiable Disclosure of Secrets and Applications (Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:150-154 [Conf]
  18. Joan Boyar, Katalin Friedl, Carsten Lund
    Practical Zero-Knowledge Proofs: Giving Hints and Using Deficiencies. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:155-172 [Conf]
  19. Jacques Stern
    An Alternative to the Fiat-Shamir Protocol. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:173-180 [Conf]
  20. Gilles Brassard, Claude Crépeau
    Sorting out Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:181-191 [Conf]
  21. Gilles Brassard, Claude Crépeau, Moti Yung
    Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:192-195 [Conf]
  22. Moti Yung
    Zero-Knowledge Proofs of Computational Power (Extended Summary). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:196-207 [Conf]
  23. Bert den Boer
    More Efficient Match-Making and Satisfiability: The Five Card Trick. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:208-217 [Conf]
  24. André Vandermeulebroecke, Etienne Vanzieleghem, Tony Denayer, Paul G. A. Jespers
    A Single Chip 1024 Bits RSA Processor. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:219-236 [Conf]
  25. Hedwig Cnudde
    Cryptel - The Practical Protection of an Existing Electronic Mail System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:237-242 [Conf]
  26. Jan Van Auseloos
    Technical Security: The Starting Point. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:243-248 [Conf]
  27. Charles Siuda
    Security in Open Distributed Processing. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:249-266 [Conf]
  28. Joos Vandewalle, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen
    A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:267-271 [Conf]
  29. Mireille Antoine, Jean-François Brakeland, Marc Eloy, Yves Poullet
    Legal Requirements Facing New Signature Technology. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:273-287 [Conf]
  30. David Chaum
    Online Cash Checks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:288-293 [Conf]
  31. David Chaum, Bert den Boer, Eugène van Heyst, Stig Fr. Mjølsnes, Adri Steenbeek
    Efficient Offline Electronic Checks (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:294-301 [Conf]
  32. Michael Waidner
    Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:302-319 [Conf]
  33. Jurjen N. Bos, Bert den Boer
    Detection of Disrupters in the DC Protocol. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:320-327 [Conf]
  34. Philippe Flajolet, Andrew M. Odlyzko
    Random Mapping Statistics. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:329-354 [Conf]
  35. Arjen K. Lenstra, Mark S. Manasse
    Factoring by Electronic Mail. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:355-371 [Conf]
  36. Michael J. Wiener
    Cryptanalysis of Short RSA Secret Exponents (Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:372- [Conf]
  37. Birgit Pfitzmann, Andreas Pfitzmann
    How to Break the Direct RSA-Implementation of Mixes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:373-381 [Conf]
  38. Hakon N. Jendal, Yves J. B. Kuhn, James L. Massey
    An Information-Theoretic Treatment of Homophonic Substitution. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:382-394 [Conf]
  39. Peer Wichmann
    Cryptanalysis of a Modified Rotor Machine. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:395-402 [Conf]
  40. Michael Bertilsson, Ernest F. Brickell, Ingemar Ingemarsson
    Cryptanalysis of Video Encryption Based on Space-Filling Curves. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:403-411 [Conf]
  41. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:412-422 [Conf]
  42. Rainer A. Rueppel
    On the Security of Schnorr's Pseudo Random Generator. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:423-428 [Conf]
  43. Jean-Jacques Quisquater, Jean-Paul Delescaille
    How Easy is Collision Search? Application to DES (Extended Summary). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:429-434 [Conf]
  44. Gustavus J. Simmons
    Prepositioned Shared Secret and/or Shared Control Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:436-467 [Conf]
  45. Ernest F. Brickell
    Some Ideal Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:468-475 [Conf]
  46. Marijke De Soete, Klaus Vedder, Michael Walker
    Cartesian Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:476-490 [Conf]
  47. Albrecht Beutelspacher
    How to Say ``No''. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:491-496 [Conf]
  48. Philippe Godlewski, Chris J. Mitchell
    Key Minimal Authentication Systems for Unconditional Secrecy. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:497-501 [Conf]
  49. Christoph G. Günther
    Parallel Generation of Recurring Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:503-522 [Conf]
  50. Harald Niederreiter
    Keysystem Sequences with a Good Linear Complexity Profile for Every STrating Point. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:523-532 [Conf]
  51. Thomas Beth, Zong-Duo Dai
    On the Complexity of Pseudo-Random Sequences - Or: If You Can Describe a Sequence It Can't be Random. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:533-543 [Conf]
  52. Zong-Duo Dai, Kencheng Zeng
    Feedforward Functions Defined By de Bruijn Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:544-548 [Conf]
  53. Willi Meier, Othmar Staffelbach
    Nonlinearity Criteria for Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:549-562 [Conf]
  54. Agnes Hui Chan, Mark Goresky, Andrew Klapper
    On the Linear Complexity of Feedback Registers (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:563-570 [Conf]
  55. Muzhong Wang
    Linear Complexity Profiles and Continued Fractions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:571-585 [Conf]
  56. Réjane Forré
    A Fats Correlation Attack on Nonlinearly Feedforward Filtered Shift-Register Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:586-595 [Conf]
  57. Johannes Buchmann, Stephan Düllmann, Hugh C. Williams
    On the Complexity and Efficiency of a New Key Exchange System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:597-616 [Conf]
  58. Colin Boyd
    A New Multiple Key Cipher and an Improved Voting Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:617-625 [Conf]
  59. François Morain
    Atkin's Test: News From the Front. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:626-635 [Conf]
  60. Ueli M. Maurer
    Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:636-647 [Conf]
  61. Yves Duhoux
    Deciphering Bronze Age Scripts of Crete - The Case of Linear A. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:649-650 [Conf]
  62. Wieb Bosma, Marc-Paul van der Hulst
    Faster Primality Testing (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:652-656 [Conf]
  63. Tzonelih Hwang, T. R. N. Rao
    Private-Key Algebraic-Code Cryptosystems with High Information Rates (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:657-661 [Conf]
  64. Jean-Jacques Quisquater, André Bouckaert
    Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:662-664 [Conf]
  65. Josep Domingo-Ferrer, Llorenç Huguet i Rotger
    Full Secure Key Exchange and Authentication with no Previously Shared Secrets. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:665-669 [Conf]
  66. Yves Roggeman
    Varying Feedback Shift Registers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:670-679 [Conf]
  67. Dieter Gollmann, William G. Chambers
    A Cryptanalysis of Stepk, m-Cascades. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:680-687 [Conf]
  68. Claus-Peter Schnorr
    Efficient Identification and Signatures for Smart Cards (Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:688-689 [Conf]
  69. Michael Waidner, Birgit Pfitzmann
    The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:690- [Conf]
  70. Glyn Carter
    Some Conditions on the Linear Complexity Profiles of Certain Binary Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:691-695 [Conf]
  71. Lawrence Brown, Jennifer Seberry
    On the Design of Permutation P in DES Type Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:696-705 [Conf]
  72. Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone
    A Fast Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:706-708 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002