The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
1994 (conf/asiacrypt/1994)

  1. Thomas Beth
    Multifeature Security through Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:1-17 [Conf]
  2. Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester
    Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:21-32 [Conf]
  3. Koji Okada, Kaoru Kurosawa
    Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:33-41 [Conf]
  4. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    On Sharing Many Secrets (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:42-54 [Conf]
  5. Kaoru Kurosawa, Koji Okada
    Combinatorial Interpretation of Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:55-64 [Conf]
  6. Miodrag J. Mihaljevic
    A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:67-79 [Conf]
  7. Amparo Fúster-Sabater, Pino Caballero-Gil
    On the Linear Complexity of Nonlinear Filtered PN-sequences. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:80-90 [Conf]
  8. Jovan Dj. Golic
    Intrinsic Statistical Weakness of Keystream Generators. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:91-103 [Conf]
  9. Seongtaek Chee, Sangjin Lee, Kwangjo Kim
    Semi-bent Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:107-118 [Conf]
  10. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:119-132 [Conf]
  11. Catherine Meadows
    Formal Verification of Cryptographic Protocols: A Survey. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:135-150 [Conf]
  12. Yacov Yacobi
    Efficient Electronic Money (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:153-163 [Conf]
  13. Valtteri Niemi, Ari Renvall
    How to Prevent Buying of Votes in Computer Elections. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:164-170 [Conf]
  14. Colin Boyd, Wenbo Mao
    Design and Analysis of Key Exchange Protocols via Secure Channel Identification. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:171-181 [Conf]
  15. Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano
    Zero-Knowledge Proofs of Computational Power in the Shared String Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:182-192 [Conf]
  16. Hideki Imai
    Information Security Aspects of Spread Spectrum Systems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:193-208 [Conf]
  17. Reihaneh Safavi-Naini, L. Tombak
    Combinatorial Structure of A-codes with r-fold Security. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:211-223 [Conf]
  18. Patrick Horster, Markus Michels, Holger Petersen
    Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:224-237 [Conf]
  19. Mohssen Alabbadi, Stephen B. Wicker
    A Digital Signature Scheme Based on Linear Error-correcting Block Codes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:238-248 [Conf]
  20. Philippe Béguin, Jean-Jacques Quisquater
    Secure Acceleration of DSS Signatures Using Insecure Server. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:249-259 [Conf]
  21. Derek Atkins, Michael Graff, Arjen K. Lenstra, Paul C. Leyland
    The Magic Words are Squeamish Ossifrage. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:263-277 [Conf]
  22. Eli Biham
    Cryptanalysis of Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:278-292 [Conf]
  23. Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui
    Linear Cryptanalysis of LOKI and s2DES. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:293-303 [Conf]
  24. Jacques Patarin
    Collisions and Inversions for Damgård's Whole Hash Function. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:307-321 [Conf]
  25. Chris Charnes, Josef Pieprzyk
    Attacking the SL2 Hashing Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:322-330 [Conf]
  26. Kaoru Kurosawa, Koji Okada, Keiichi Sakano
    Security of the Center in Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:333-341 [Conf]
  27. Tsutomu Matsumoto
    Incidence Structures for Key Sharing (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:342-353 [Conf]
  28. Peter Smith, Christopher Skinner
    A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:357-364 [Conf]
  29. Masayuki Abe, Hikaru Morita
    Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:365-375 [Conf]
  30. Kaoru Kurosawa, Koji Okada, Shigeo Tsujii
    Low Exponent Attack against Elliptic Curve RSA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:376-383 [Conf]
  31. Luke O'Connor, Jovan Dj. Golic
    A Unified Markow Approach to Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:387-397 [Conf]
  32. Eli Biham, Alex Biryukov
    How to Strengthen DES Using Existing Hardware. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:398-412 [Conf]
  33. Xingong Chang, Zong-Duo Dai, Guang Gong
    Some Cryptographic Properties of Exponential Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:415-418 [Conf]
  34. Donald Beaver
    Factoring: The DNA Solution. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:419-423 [Conf]
  35. Jacques Stern
    Can One Design a Signature Scheme Based on Error-Correctin Codes? [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:424-426 [Conf]
  36. Gary Carter, Andrew Clark, Lauren Nielsen
    DESV-1: A Variation of the Data Encryption Standard (DES). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:427-430 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002