The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
1991 (conf/asiacrypt/1991)

  1. Donald W. Davies
    The Transition from Mechanisms to Electronic Computers, 1940 to 1950. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:1-21 [Conf]
  2. Lars R. Knudsen
    Cryptanalysis of LOKI. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:22-35 [Conf]
  3. Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry
    Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:36-50 [Conf]
  4. Hiroshi Miyano
    A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:51-58 [Conf]
  5. Kwangjo Kim
    Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:59-72 [Conf]
  6. Jun-Hui Yang, Zong-Duo Dai, Kencheng Zeng
    The Data Base of Selected Permutations (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:73-81 [Conf]
  7. Joan Daemen, René Govaerts, Joos Vandewalle
    A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:82-96 [Conf]
  8. Babak Sadeghiyan, Yuliang Zheng, Josef Pieprzyk
    How to Construct A Family of Strong One Way Permutations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:97-110 [Conf]
  9. Wakaha Ogata, Kaoru Kurosawa
    On Claw Free Families. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:111-123 [Conf]
  10. Yuliang Zheng, Thomas Hardjono, Josef Pieprzyk
    Sibling Intractable Function Families and Their Applications (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:124-138 [Conf]
  11. Kazuo Ohta, Tatsuaki Okamoto
    A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:139-148 [Conf]
  12. Hung-Yu Lin, Lein Harn
    A Generalized Secret Sharing Scheme With Cheater Detection. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:149-158 [Conf]
  13. Chi-Sung Laih, Lein Harn
    Generalized Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:159-166 [Conf]
  14. Reihaneh Safavi-Naini
    Feistel Type Authentication Codes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:170-178 [Conf]
  15. Man Y. Rhee
    Research Activities on Cryptology in Korea. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:179-193 [Conf]
  16. Babak Sadeghiyan, Josef Pieprzyk
    On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:194-209 [Conf]
  17. Shimon Even, Yishay Mansour
    A Construction of a Cioher From a Single Pseudorandom Permutation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:210-224 [Conf]
  18. Josef Pieprzyk, Babak Sadeghiyan
    Optima Perfect Randomizers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:225-236 [Conf]
  19. Matthew Kwan, Josef Pieprzyk
    A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:237-246 [Conf]
  20. Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi
    Results of Switching-Closure-Test on FEAL (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:247-252 [Conf]
  21. Jun-ichi Mizusawa
    IC-Cards and Telecommunication Services. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:253-264 [Conf]
  22. Atsushi Shimbo, Shin-ichi Kawamura
    Cryptanalysis of Several Conference Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:265-276 [Conf]
  23. Andrew Klapper, Mark Goresky
    Revealing Information with Partial Period Correlations (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:277-287 [Conf]
  24. Joost Meijers, Johan van Tilburg
    Extended Majority Voting and Private-Key Algebraic-Code Encryptions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:288-298 [Conf]
  25. Bruce Goldburg, Ed Dawson, S. Sridharan
    A Secure Analog Speech Scrambler Using the Discrete Cosine Transform. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:299-311 [Conf]
  26. Lein Harn, Hung-Yu Lin
    On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:312-320 [Conf]
  27. Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai
    4 Move Perfect ZKIP of Knowledge with No Assumption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:321-330 [Conf]
  28. Toshiya Itoh, Kouichi Sakurai
    On the Complexity of Constant Round ZKIP of Possession of Knowledge. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:331-345 [Conf]
  29. Lance Fortnow, Mario Szegedy
    On the Power of Two-Local Random Reductions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:346-351 [Conf]
  30. Joan Feigenbaum, Rafail Ostrovsky
    A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:352-359 [Conf]
  31. Yvo Desmedt, Mike Burmester
    An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:360-367 [Conf]
  32. Tatsuaki Okamoto
    An Extensin of Zero-Knowledge Proofs and Its Applications. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:368-381 [Conf]
  33. Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya
    Any Language in IP Has a Divertable ZKIP. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:382-396 [Conf]
  34. Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai
    A Multi-Purpose Proof System - for Identity and Membership Proofs. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:397-411 [Conf]
  35. Marie-Jeanne Toussaint
    Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:412-426 [Conf]
  36. Ronald L. Rivest
    Cryptography and Machine Learning. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:427-439 [Conf]
  37. Jørgen Brandt, Ivan Damgård, Peter Landrock
    Speeding up Prime Number Generation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:440-449 [Conf]
  38. Chi-Sung Laih, Sung-Ming Yen, Lein Harn
    Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:450-459 [Conf]
  39. Atsuko Miyaji
    On Ordinary Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:460-469 [Conf]
  40. Antoine Joux, Jacques Stern
    Cryptanalysis of Another Knapsack Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:470-476 [Conf]
  41. Joan Daemen, Antoon Bosselaers, René Govaerts, Joos Vandewalle
    Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:477-480 [Conf]
  42. Ronald L. Rivest
    On NIST's Proposed Digital Signature Standard. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:481-484 [Conf]
  43. Toshinobu Kaneko
    A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:485-488 [Conf]
  44. Matthew Kwan
    Simultaneous Attacks in Differential Cryptanalysis (Getting More Pairs Per Encryption). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:489-492 [Conf]
  45. Stig Fr. Mjølsnes
    Privacy, Cryptographic Pseudonyms, and The State of Health. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:493-494 [Conf]
  46. Joan Daemen
    Limitations of the Even-Mansour Construction. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:495-498 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002