Conferences in DBLP
Johan Borst , Lars R. Knudsen , Vincent Rijmen Two Attacks on Reduced IDEA. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:1-13 [Conf ] Thilo Zieschang Combinatorial Properties of Basic Encryption Operations (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:14-26 [Conf ] David Naccache , Jacques Stern A New Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:27-36 [Conf ] Dan Boneh , Richard A. DeMillo , Richard J. Lipton On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:37-51 [Conf ] Don Coppersmith , Adi Shamir Lattice Attacks on NTRU. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:52-61 [Conf ] Adam Young , Moti Yung Kleptography: Using Cryptography Against Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:62-74 [Conf ] Ronald Cramer , Ivan Damgård Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:75-87 [Conf ] Birgit Pfitzmann , Michael Waidner Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:88-102 [Conf ] Ronald Cramer , Rosario Gennaro , Berry Schoenmakers A Secure and Optimally Efficient Multi-Authority Election Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:103-118 [Conf ] Eric R. Verheul , Henk C. A. van Tilborg Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:119-133 [Conf ] Ross J. Anderson , Michael Roe The GCHQ Protocol and Its Problems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:134-148 [Conf ] Thomas Johansson Bucket Hashing with a Small Key Size. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:149-162 [Conf ] Mihir Bellare , Daniele Micciancio A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:163-192 [Conf ] Christian Cachin Smooth Entropy and Rényi Entropy. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:193-208 [Conf ] Ueli M. Maurer Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:209-225 [Conf ] Jovan Dj. Golic Linear Statistical Weakness of Alleged RC4 Keystream Generator. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:226-238 [Conf ] Jovan Dj. Golic Cryptanalysis of Alleged A5 Stream Cipher. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:239-255 [Conf ] Victor Shoup Lower Bounds for Discrete Logarithms and Related Problems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:256-266 [Conf ] Roger Fischlin , Claus-Peter Schnorr Stronger Security Proofs for RSA and Rabin Bits. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:267-279 [Conf ] Mihir Bellare , Markus Jakobsson , Moti Yung Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:280-305 [Conf ] Marc Fischlin Incremental Cryptography and Memory Checkers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:293-408 [Conf ] Claude Crépeau Efficient Cryptographic Protocols Based on Noisy Channels. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:306-317 [Conf ] Stefan Brands Rapid Demonstration of Linear Relations Connected by Boolean Operators. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:318-333 [Conf ] Gilles Brassard , Claude Crépeau Oblivious Transfers and Privacy Amplification. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:334-347 [Conf ] Antoon Bosselaers , René Govaerts , Joos Vandewalle SHA: A Design for Parallel Architectures? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:348-362 [Conf ] Christof Paar , Pedro Soria-Rodriguez Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2^{n} )^{m} ). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:363-378 [Conf ] Reynald Lercier Finding Good Random Elliptic Curves for Cryptosystems Defined over F_{2} ^{n} . [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:379-392 [Conf ] Kaoru Kurosawa , Thomas Johansson , Douglas R. Stinson Almost k-wise Independent Sample Spaces and Their Cryptologic Applications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:409-421 [Conf ] Claude Carlet More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:422-433 [Conf ] Kaoru Kurosawa , Takashi Satoh Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:434-449 [Conf ] Markus Jakobsson , Moti Yung Distributed "Magic Ink" Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:450-464 [Conf ] Jan Camenisch Efficient and Generalized Group Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:465-479 [Conf ] Niko Bari , Birgit Pfitzmann Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:480-494 [Conf ] Marc Girault , Jean-François Misarsky Selective Forgery of RSA Signatures Using Redundancy. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:495-507 [Conf ]