Conferences in DBLP
Whitfield Diffie The Adolescence of Public-Key Cryptography (Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:2- [Conf ] Zvi Galil , Stuart Haber , Moti Yung A Secure Public-key Authentication Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:3-15 [Conf ] Gilles Brassard How to Improve Signature Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:16-22 [Conf ] Walter J. Jaburek A Generalization of El Gamal's Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:23-28 [Conf ] Christoph G. Günther An Identity-Based Key-Exchange Protocol. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:29-37 [Conf ] Fritz Bauspieß , Hans-Joachim Knobloch How to Keep Authenticity Alive in a Computer Network. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:38-46 [Conf ] Hartmut Isselhorst The Use of Fractions in Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:47-55 [Conf ] Yair Frankel A Practical Protocol for Large Group Oriented Networks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:56-61 [Conf ] Sheelagh Lloyd Counting Functions Satisfying a Higher Order Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:63-74 [Conf ] George I. Davida , Yvo Desmedt , René Peralta A Key Distribution System Based On Any One-Way Function (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:75-79 [Conf ] Josef Pieprzyk Non-linearity of Exponent Permutations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:80-92 [Conf ] Andrea Sgarro Informational Divergence Bounds for Authentication Codes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:93-101 [Conf ] Jean-Jacques Quisquater , Marc Girault 2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:102-109 [Conf ] Stig Fr. Mjølsnes A Simple Technique for Diffusing Cryptoperiods. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:110-120 [Conf ] Mike Burmester , Yvo Desmedt , Fred Piper , Michael Walker A General Zero-Knowledge Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:122-133 [Conf ] Tatsuaki Okamoto , Kazuo Ohta Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:134-148 [Conf ] Claude Crépeau Verifiable Disclosure of Secrets and Applications (Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:150-154 [Conf ] Joan Boyar , Katalin Friedl , Carsten Lund Practical Zero-Knowledge Proofs: Giving Hints and Using Deficiencies. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:155-172 [Conf ] Jacques Stern An Alternative to the Fiat-Shamir Protocol. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:173-180 [Conf ] Gilles Brassard , Claude Crépeau Sorting out Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:181-191 [Conf ] Gilles Brassard , Claude Crépeau , Moti Yung Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:192-195 [Conf ] Moti Yung Zero-Knowledge Proofs of Computational Power (Extended Summary). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:196-207 [Conf ] Bert den Boer More Efficient Match-Making and Satisfiability: The Five Card Trick . [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:208-217 [Conf ] André Vandermeulebroecke , Etienne Vanzieleghem , Tony Denayer , Paul G. A. Jespers A Single Chip 1024 Bits RSA Processor. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:219-236 [Conf ] Hedwig Cnudde Cryptel - The Practical Protection of an Existing Electronic Mail System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:237-242 [Conf ] Jan Van Auseloos Technical Security: The Starting Point. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:243-248 [Conf ] Charles Siuda Security in Open Distributed Processing. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:249-266 [Conf ] Joos Vandewalle , David Chaum , Walter Fumy , Cees J. A. Jansen , Peter Landrock , Gert Roelofsen A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:267-271 [Conf ] Mireille Antoine , Jean-François Brakeland , Marc Eloy , Yves Poullet Legal Requirements Facing New Signature Technology. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:273-287 [Conf ] David Chaum Online Cash Checks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:288-293 [Conf ] David Chaum , Bert den Boer , Eugène van Heyst , Stig Fr. Mjølsnes , Adri Steenbeek Efficient Offline Electronic Checks (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:294-301 [Conf ] Michael Waidner Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:302-319 [Conf ] Jurjen N. Bos , Bert den Boer Detection of Disrupters in the DC Protocol. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:320-327 [Conf ] Philippe Flajolet , Andrew M. Odlyzko Random Mapping Statistics. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:329-354 [Conf ] Arjen K. Lenstra , Mark S. Manasse Factoring by Electronic Mail. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:355-371 [Conf ] Michael J. Wiener Cryptanalysis of Short RSA Secret Exponents (Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:372- [Conf ] Birgit Pfitzmann , Andreas Pfitzmann How to Break the Direct RSA-Implementation of Mixes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:373-381 [Conf ] Hakon N. Jendal , Yves J. B. Kuhn , James L. Massey An Information-Theoretic Treatment of Homophonic Substitution. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:382-394 [Conf ] Peer Wichmann Cryptanalysis of a Modified Rotor Machine. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:395-402 [Conf ] Michael Bertilsson , Ernest F. Brickell , Ingemar Ingemarsson Cryptanalysis of Video Encryption Based on Space-Filling Curves. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:403-411 [Conf ] Yuliang Zheng , Tsutomu Matsumoto , Hideki Imai Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:412-422 [Conf ] Rainer A. Rueppel On the Security of Schnorr's Pseudo Random Generator. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:423-428 [Conf ] Jean-Jacques Quisquater , Jean-Paul Delescaille How Easy is Collision Search? Application to DES (Extended Summary). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:429-434 [Conf ] Gustavus J. Simmons Prepositioned Shared Secret and/or Shared Control Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:436-467 [Conf ] Ernest F. Brickell Some Ideal Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:468-475 [Conf ] Marijke De Soete , Klaus Vedder , Michael Walker Cartesian Authentication Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:476-490 [Conf ] Albrecht Beutelspacher How to Say ``No''. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:491-496 [Conf ] Philippe Godlewski , Chris J. Mitchell Key Minimal Authentication Systems for Unconditional Secrecy. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:497-501 [Conf ] Christoph G. Günther Parallel Generation of Recurring Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:503-522 [Conf ] Harald Niederreiter Keysystem Sequences with a Good Linear Complexity Profile for Every STrating Point. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:523-532 [Conf ] Thomas Beth , Zong-Duo Dai On the Complexity of Pseudo-Random Sequences - Or: If You Can Describe a Sequence It Can't be Random. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:533-543 [Conf ] Zong-Duo Dai , Kencheng Zeng Feedforward Functions Defined By de Bruijn Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:544-548 [Conf ] Willi Meier , Othmar Staffelbach Nonlinearity Criteria for Cryptographic Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:549-562 [Conf ] Agnes Hui Chan , Mark Goresky , Andrew Klapper On the Linear Complexity of Feedback Registers (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:563-570 [Conf ] Muzhong Wang Linear Complexity Profiles and Continued Fractions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:571-585 [Conf ] Réjane Forré A Fats Correlation Attack on Nonlinearly Feedforward Filtered Shift-Register Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:586-595 [Conf ] Johannes Buchmann , Stephan Düllmann , Hugh C. Williams On the Complexity and Efficiency of a New Key Exchange System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:597-616 [Conf ] Colin Boyd A New Multiple Key Cipher and an Improved Voting Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:617-625 [Conf ] François Morain Atkin's Test: News From the Front. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:626-635 [Conf ] Ueli M. Maurer Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:636-647 [Conf ] Yves Duhoux Deciphering Bronze Age Scripts of Crete - The Case of Linear A. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:649-650 [Conf ] Wieb Bosma , Marc-Paul van der Hulst Faster Primality Testing (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:652-656 [Conf ] Tzonelih Hwang , T. R. N. Rao Private-Key Algebraic-Code Cryptosystems with High Information Rates (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:657-661 [Conf ] Jean-Jacques Quisquater , André Bouckaert Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:662-664 [Conf ] Josep Domingo-Ferrer , Llorenç Huguet i Rotger Full Secure Key Exchange and Authentication with no Previously Shared Secrets. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:665-669 [Conf ] Yves Roggeman Varying Feedback Shift Registers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:670-679 [Conf ] Dieter Gollmann , William G. Chambers A Cryptanalysis of Stepk, m -Cascades. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:680-687 [Conf ] Claus-Peter Schnorr Efficient Identification and Signatures for Smart Cards (Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:688-689 [Conf ] Michael Waidner , Birgit Pfitzmann The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:690- [Conf ] Glyn Carter Some Conditions on the Linear Complexity Profiles of Certain Binary Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:691-695 [Conf ] Lawrence Brown , Jennifer Seberry On the Design of Permutation P in DES Type Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:696-705 [Conf ] Gordon B. Agnew , Ronald C. Mullin , Scott A. Vanstone A Fast Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:706-708 [Conf ]