Conferences in DBLP
Claus-Peter Schnorr , Horst Helmut Hörner Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:1-12 [Conf ] Luke O'Connor Convergence in Differential Distributions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:13-23 [Conf ] Carlo Harpes , Gerhard G. Kramer , James L. Massey A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:24-38 [Conf ] Lidong Chen , Torben P. Pedersen On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:39-49 [Conf ] Matthew K. Franklin , Michael K. Reiter Verifiable Signature Sharing. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:50-63 [Conf ] Chae Hoon Lim , Pil Joong Lee Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:64-78 [Conf ] Reynald Lercier , François Morain Counting the Number of Points on Elliptic Curves over Finite Fields: Strategies and Performance. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:79-94 [Conf ] Damian Weber An Implementation of the General Number Field Sieve to Compute Discrete Logarithms mod p. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:95-105 [Conf ] Peter L. Montgomery A Block Lanczos Algorithm for Finding Dependencies Over GF(2). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:106-120 [Conf ] Birgit Pfitzmann , Matthias Schunter , Michael Waidner How to Break Another Provably Secure Payment System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:121-132 [Conf ] Claude Crépeau , Louis Salvail Quantum Oblivious Mutual Identification. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:133-146 [Conf ] Yvo Desmedt Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:147-157 [Conf ] Christian Gehrmann Secure Multiround Authentication Protocols. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:158-167 [Conf ] Rosario Gennaro , Silvio Micali Verifiable Secret Sharing as Secure Computation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:168-182 [Conf ] Wen-Ai Jackson , Keith M. Martin , Christine M. O'Keefe Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:183-193 [Conf ] Philippe Béguin , Antonella Cresti General Short Computational Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:194-208 [Conf ] Markus Stadler , Jean-Marc Piveteau , Jan Camenisch Fair Blind Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:209-219 [Conf ] Markus Jakobsson Ripping Coins For a Fair Exchange. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:220-230 [Conf ] Stefan Brands Restrictive Blinding of Secret-Key Certificates. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:231-247 [Conf ] Jovan Dj. Golic Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:248-262 [Conf ] Andrew Klapper , Mark Goresky Large Periods Nearly de Bruijn FCSR Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:263-273 [Conf ] Xian-Mo Zhang , Yuliang Zheng On Nonlinear Resilient Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:274-288 [Conf ] Kaoru Kurosawa , Satoshi Obana Combinatorial Bounds for Authentication Codes with Arbitration. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:289-300 [Conf ] Hugo Krawczyk New Hash Functions For Message Authentication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:301-310 [Conf ] Jürgen Bierbrauer A² Codes from Universal Hash Classes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:311-318 [Conf ] David Pointcheval A New Identification Scheme Based on the Perceptrons Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:319-328 [Conf ] Kenji Koyama Fast RSA-type Schemes Based on Singular Cubic Curves y²+axy=m³(mod n). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:329-340 [Conf ] Kouichi Sakurai , Hiroki Shizuya Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:341-355 [Conf ] Mats Näslund Universal Hash Functions & Hard Core Bits. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:356-366 [Conf ] Giovanni Di Crescenzo Recycling Random Bits in Composed Perfect Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:367-381 [Conf ] Chih-Hung Wang , Tzonelih Hwang , Jiun-Jang Tsai On the Matsumoto and Imai's Human Identification Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:382-392 [Conf ] Kazue Sako , Joe Kilian Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:393-403 [Conf ] David Naccache , David M'Raïhi , William Wolfowicz , Adina di Porto Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:404-409 [Conf ] Stefano D'Amiano , Giovanni Di Crescenzo Anonymous NIZK Proofs of Knowledge with Preprocessing. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:413-416 [Conf ]