The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
1991 (conf/eurocrypt/91)

  1. Eli Biham, Adi Shamir
    Differential Cryptoanalysis of Feal and N-Hash. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:1-16 [Conf]
  2. Xuejia Lai, James L. Massey
    Markov Ciphers and Differentail Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:17-38 [Conf]
  3. Paul Camion, Jacques Patarin
    The Knapsack Hash Function proposed at Crypto'89 can be broken. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:39-53 [Conf]
  4. Matthijs J. Coster, Brian A. LaMacchia, Andrew M. Odlyzko
    An Iproved Low-Denisty Subset Sum Algorithm. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:54-67 [Conf]
  5. Valery I. Korzhik, Andrew I. Turkin
    Cryptoanalysis of McEliece's Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:68-70 [Conf]
  6. Peter de Rooij
    On the Security of the Schnorr Scheme using Preprocessing. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:71-80 [Conf]
  7. Mike Burmester, Yvo Desmedt
    Broadcast Interactive Proofs (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:81-95 [Conf]
  8. Tatsuaki Okamoto, David Chaum, Kazuo Ohta
    Direct Zero Knowledge Proofs of Computational Power in Five Rounds. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:96-105 [Conf]
  9. Claude Crépeau, Miklos Santha
    On the Reversibility of Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:106-113 [Conf]
  10. Sibylle Mund
    Liv-Lempel Complexity for Periodic Sequences and its Cryptographic Application. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:114-126 [Conf]
  11. Toshiki Habutsu, Yoshifumi Nishio, Iwao Sasase, Shinsaku Mori
    A Secret Key Cryptosystem by Iterating a Chaotic Map. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:127-140 [Conf]
  12. Bart Preneel, René Govaerts, Joos Vandewalle
    Boolean Functions Satisfying Higher Order Propagation Criteria. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:141-152 [Conf]
  13. Cees J. A. Jansen
    The Maximum Order Complexity of Sequence Ensembles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:153-159 [Conf]
  14. Jovan Dj. Golic
    The Number of Output Sequences of a Binary Sequence Generator. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:160-167 [Conf]
  15. Zong-Duo Dai, Jun-Hui Yang
    Linear Complexity of Periodically Repeated Random Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:168-175 [Conf]
  16. Vladimor V. Chepyzhov, Ben J. M. Smeets
    On A Fast Correlation Attack on Certain Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:176-185 [Conf]
  17. Willi Meier, Othmar Staffelbach
    Analysis of Pseudo Random Sequence Generated by Cellular Automata. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:186-199 [Conf]
  18. William G. Chambers, Zong-Duo Dai
    On Binary Sequences from Recursions modulo 2e Made Non-Linear by the Bit-by-Bit XOR Function. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:200-204 [Conf]
  19. Yvo Desmedt, Moti Yung
    Weakness of Undeniable Signature Schemes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:205-220 [Conf]
  20. Torben P. Pedersen
    Distributed Provers with Applications to Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:221-242 [Conf]
  21. Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta
    Interactive Bi-Proof Systems and Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:243-256 [Conf]
  22. David Chaum, Eugène van Heyst
    Group Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:257-265 [Conf]
  23. Colin Boyd
    Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:266-280 [Conf]
  24. Claus-Peter Schnorr
    Factoring Integers and Computing Discrete Logarithms via Diophantine Approximations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:281-293 [Conf]
  25. Klaus Huber
    Some Considerations concerning the Selection of RSA Moduli. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:294-301 [Conf]
  26. Michael Portz
    On the Use of Interconnection Networks in Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:302-315 [Conf]
  27. Thomas Beth, F. Schaefer
    Non Supersingular Elliptic Curves for Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:316-327 [Conf]
  28. François Morain
    Building Elliptic Curves Modulo Large Primes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:328-336 [Conf]
  29. Hiroki Shizuya, Toshiya Itoh, Kouichi Sakurai
    On the Complexity of Hyperelliptic Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:337-351 [Conf]
  30. M. H. Dawson, Stafford E. Tavares
    An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:352-367 [Conf]
  31. Luke O'Connor
    Enumerating Nondegenerate Permutations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:368-377 [Conf]
  32. Kaisa Nyberg
    Perfect Nonlinear S-Boxes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:378-386 [Conf]
  33. Rainer A. Rueppel
    A Formal Approach to Security Architectures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:387-398 [Conf]
  34. Patrick Horster, Hans-Joachim Knobloch
    Discrete Logarithm Based Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:399-408 [Conf]
  35. Tsutomu Matsumoto
    Human Identification Through Insecure Channel. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:409-421 [Conf]
  36. Bruce Goldburg, Ed Dawson, S. Sridharan
    The Automated Cryptoanalysis of Analog Speech Scramblers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:422-430 [Conf]
  37. Babak Sadeghiyan, Josef Pieprzyk
    A Construction for One Way Hash Functions and Pseudorandom Bit Generators. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:431-445 [Conf]
  38. Atsushi Fujioka, Tatsuaki Okamoto, Shoji Miyaguchi
    ESIGN: An Efficient Digital Signature Implementation for Smard Cards. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:446-457 [Conf]
  39. Ueli M. Maurer
    New Approaches to the Design of Self-Synchronizing Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:458-471 [Conf]
  40. Josef Pieprzyk, Reihaneh Safavi-Naini
    Randomized Authentication Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:472-481 [Conf]
  41. Ernst M. Gabidulin, A. V. Paramonov, O. V. Tretjakov
    Ideals over a Non-Commutative Ring and thier Applications in Cryptology. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:482-489 [Conf]
  42. Marc Girault
    Self-Certified Public Keys. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:490-497 [Conf]
  43. Ueli M. Maurer, Yacov Yacobi
    Non-interactive Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:498-507 [Conf]
  44. Gilles Zémor
    Hash Functions And Graphs With Large Girths. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:508-511 [Conf]
  45. Winfried B. Müller, Alan Oswald
    Dickson Pseudoprimes and Primality Testing. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:512-516 [Conf]
  46. J. K. Gibson
    Equivalent Goppa Codes and Trapdoors to McEliece's Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:517-521 [Conf]
  47. Torben P. Pedersen
    A Threshold Cryptosystem without a Trusted Party (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:522-526 [Conf]
  48. Miodrag J. Mihaljevic, Jovan Dj. Golic
    A Comparison of Cryptoanalytic Principles Based on Iterative Error-Correction. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:527-531 [Conf]
  49. Eli Biham
    Cryptoanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:532-534 [Conf]
  50. Shimshon Berkovits
    How To Broadcast A Secret. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:535-541 [Conf]
  51. Josef Pieprzyk
    Probabilistic Analysis of Elementary Randimizers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:542-546 [Conf]
  52. Bart Preneel, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen
    Race Integrity Primitives Evaluation (RIPE): A Status Report. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:547-551 [Conf]
  53. Lennart Brynielsson
    The Information Leakage through a Randomly Generated Function. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:552-553 [Conf]
  54. David Chaum
    Some Weaknesses of "Weaknesses of Undeniable Signatures". [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:554-556 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002