The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
1995 (conf/eurocrypt/95)

  1. Claus-Peter Schnorr, Horst Helmut Hörner
    Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:1-12 [Conf]
  2. Luke O'Connor
    Convergence in Differential Distributions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:13-23 [Conf]
  3. Carlo Harpes, Gerhard G. Kramer, James L. Massey
    A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:24-38 [Conf]
  4. Lidong Chen, Torben P. Pedersen
    On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:39-49 [Conf]
  5. Matthew K. Franklin, Michael K. Reiter
    Verifiable Signature Sharing. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:50-63 [Conf]
  6. Chae Hoon Lim, Pil Joong Lee
    Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:64-78 [Conf]
  7. Reynald Lercier, François Morain
    Counting the Number of Points on Elliptic Curves over Finite Fields: Strategies and Performance. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:79-94 [Conf]
  8. Damian Weber
    An Implementation of the General Number Field Sieve to Compute Discrete Logarithms mod p. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:95-105 [Conf]
  9. Peter L. Montgomery
    A Block Lanczos Algorithm for Finding Dependencies Over GF(2). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:106-120 [Conf]
  10. Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    How to Break Another Provably Secure Payment System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:121-132 [Conf]
  11. Claude Crépeau, Louis Salvail
    Quantum Oblivious Mutual Identification. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:133-146 [Conf]
  12. Yvo Desmedt
    Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:147-157 [Conf]
  13. Christian Gehrmann
    Secure Multiround Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:158-167 [Conf]
  14. Rosario Gennaro, Silvio Micali
    Verifiable Secret Sharing as Secure Computation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:168-182 [Conf]
  15. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:183-193 [Conf]
  16. Philippe Béguin, Antonella Cresti
    General Short Computational Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:194-208 [Conf]
  17. Markus Stadler, Jean-Marc Piveteau, Jan Camenisch
    Fair Blind Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:209-219 [Conf]
  18. Markus Jakobsson
    Ripping Coins For a Fair Exchange. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:220-230 [Conf]
  19. Stefan Brands
    Restrictive Blinding of Secret-Key Certificates. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:231-247 [Conf]
  20. Jovan Dj. Golic
    Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:248-262 [Conf]
  21. Andrew Klapper, Mark Goresky
    Large Periods Nearly de Bruijn FCSR Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:263-273 [Conf]
  22. Xian-Mo Zhang, Yuliang Zheng
    On Nonlinear Resilient Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:274-288 [Conf]
  23. Kaoru Kurosawa, Satoshi Obana
    Combinatorial Bounds for Authentication Codes with Arbitration. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:289-300 [Conf]
  24. Hugo Krawczyk
    New Hash Functions For Message Authentication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:301-310 [Conf]
  25. Jürgen Bierbrauer
    A² Codes from Universal Hash Classes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:311-318 [Conf]
  26. David Pointcheval
    A New Identification Scheme Based on the Perceptrons Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:319-328 [Conf]
  27. Kenji Koyama
    Fast RSA-type Schemes Based on Singular Cubic Curves y²+axy=m³(mod n). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:329-340 [Conf]
  28. Kouichi Sakurai, Hiroki Shizuya
    Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:341-355 [Conf]
  29. Mats Näslund
    Universal Hash Functions & Hard Core Bits. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:356-366 [Conf]
  30. Giovanni Di Crescenzo
    Recycling Random Bits in Composed Perfect Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:367-381 [Conf]
  31. Chih-Hung Wang, Tzonelih Hwang, Jiun-Jang Tsai
    On the Matsumoto and Imai's Human Identification Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:382-392 [Conf]
  32. Kazue Sako, Joe Kilian
    Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:393-403 [Conf]
  33. David Naccache, David M'Raïhi, William Wolfowicz, Adina di Porto
    Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:404-409 [Conf]
  34. Stefano D'Amiano, Giovanni Di Crescenzo
    Anonymous NIZK Proofs of Knowledge with Preprocessing. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:413-416 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002