The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
1992 (conf/asiacrypt/1992)

  1. Yvo Desmedt
    Treshold Cryptosystems (invited talk). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:3-14 [Conf]
  2. L. Tombak, Reihaneh Safavi-Naini
    Authentication Codes with Perfect Protection. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:15-26 [Conf]
  3. Yvo Desmedt, Jennifer Seberry
    Practical Proven Secure Authentication with Arbitration. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:27-32 [Conf]
  4. Reihaneh Safavi-Naini, L. Tombak
    Authentication Codes under Impersonation Attack. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:35-47 [Conf]
  5. Wen-Ai Jackson, Keith M. Martin
    Cumulative Arrays and Geometric Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:48-55 [Conf]
  6. Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii
    Nonperfect Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:56-66 [Conf]
  7. Michael Bertilsson, Ingemar Ingemarsson
    A Construction of Practical Secret Sharing Schemes using Linear Block Codes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:67-79 [Conf]
  8. Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry
    HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:83-104 [Conf]
  9. Bart Preneel, René Govaerts, Joos Vandewalle
    On the Power of Memory in the Design of Collision Resistant Hash Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:105-121 [Conf]
  10. Thomas Hardjono, Yuliang Zheng
    A Practical Digital Multisignature Scheme Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:122-132 [Conf]
  11. Lein Harn, Shoubao Yang
    Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:133-142 [Conf]
  12. Jennifer Seberry, Xian-Mo Zhang
    Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:145-155 [Conf]
  13. Chris Charnes, Josef Pieprzyk
    Linear Nonequivalence versus Nonlinearity. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:156-164 [Conf]
  14. John Detombe, Stafford E. Tavares
    Constructing Large Cryptographically Strong S-boxes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:165-181 [Conf]
  15. Valery I. Korzhik, Victor Yakovlev
    Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:185-195 [Conf]
  16. Lars R. Knudsen
    Cryptanalysis of LOKI91. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:196-208 [Conf]
  17. Ed Dawson
    Cryptanalysis of Summation Generator. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:209-215 [Conf]
  18. Chi-Sung Laih, Sung-Ming Yen
    Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:219-230 [Conf]
  19. Kouichi Sakurai, Toshiya Itoh
    Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:231-243 [Conf]
  20. Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta
    A Practical Secret Voting Scheme for Large Scale Elections. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:244-251 [Conf]
  21. Takashi Satoh, Kaoru Kurosawa, Shigeo Tsujii
    Privacy for Multi-Party Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:252-260 [Conf]
  22. Jean Claude Pailles
    New Protocols for Electronic Money. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:263-274 [Conf]
  23. Benjamin B. Nieh, Stafford E. Tavares
    Modelling and Analyzing Cryprographic Protocols Using Petri Nets. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:275-295 [Conf]
  24. Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen
    On Verifiable Implicit Asking Protocols for RSA Computation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:296-307 [Conf]
  25. Chae Hoon Lim, Pil Joong Lee
    Modified Maurer-Yacobi`s scheme and its applications. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:308-323 [Conf]
  26. Andrew Klapper
    The Vulnerability of Geometric Sequences Based on Fields on Odd Characteristic. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:327-338 [Conf]
  27. Xuejia Lai, Rainer A. Rueppel, Jack Woollven
    A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:339-348 [Conf]
  28. Miodrag J. Mihaljevic
    An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:349-356 [Conf]
  29. Jun-Hui Yang, Zong-Duo Dai
    Construction of m-ary de Bruijn Sequences (Extendet abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:357-363 [Conf]
  30. John Snare
    Information Technology Security Standards - An Australian Perspective. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:367-384 [Conf]
  31. Manuel Cerecedo, Tsutomu Matsumoto, Hideki Imai
    Non-Interactive Generation of Shared Pseudorandom Sequences. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:385-396 [Conf]
  32. Michael Portz
    A Generalized Description of DES-based and Benes-based Permutationgenerators. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:397-409 [Conf]
  33. Leisa Condie
    Prime Generation with the Demytko-Miller-Trbuvich Algorithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:413-421 [Conf]
  34. Alain P. Hiltgen
    Constructions of Freebly-One-Way Families of Permutations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:422-434 [Conf]
  35. Kouichi Sakurai, Toshiya Itoh
    On Bit Correlations Among Preimages of "Many to One" One-Way Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:435-446 [Conf]
  36. Sung-Ming Yen, Chi-Sung Laih
    The Fast Cascade Exponentation Algorithm and its Applications on Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:447-456 [Conf]
  37. Chin-Chen Chang, Tzong-Chen Wu, C. P. Chen
    The Design of a Conference Key Distribution System. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:459-466 [Conf]
  38. Edward Zuk
    Remarks on "The Design of a Conference Key Distribution System". [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:467-468 [Conf]
  39. Lein Harn, Shoubao Yang
    Public-Key Cryptosystem Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:469-476 [Conf]
  40. Atsuko Miyaji
    Elliptic Curves over Fp Suitable for Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:479-491 [Conf]
  41. Christian Waldvogel, James L. Massey
    The Probability Distribution of the Diffie-Hellman Key. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:492-504 [Conf]
  42. Jörg Sauerbrey
    A Modular Exponentiation Unit Based on Systolic Arrays. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:505-516 [Conf]
  43. Christine M. O'Keefe
    A Comparison of Key Distribution Patterns Constructed from Circle Geometries. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:517-527 [Conf]
  44. Mike Rezny, Eddie Trimarchi
    A Block Cipher Method using Combinations of Different Methods under the Control of the User Key. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:531-534 [Conf]
  45. Bart Preneel, René Govaerts, Joos Vandewalle
    An Attack on Two Hash Functions by Zheng-Matsumoto-Imai. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:535-538 [Conf]
  46. Rudolf Lidl, Winfried B. Müller
    Primality Testing with Lucas Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:539-542 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002