The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
1996 (conf/asiacrypt/1996)

  1. Atsuko Miyaji
    A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:1-14 [Conf]
  2. Ingrid Biehl, Bernd Meyer, Christoph Thiel
    Cryptographic Protocols Based on Real-Quadratic A-fields. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:15-25 [Conf]
  3. Ross J. Anderson, Serge Vaudenay
    Minding your p's and q`s. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:26-35 [Conf]
  4. Mike Just, Serge Vaudenay
    Authenticated Multi-Party Key Agreement. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:36-49 [Conf]
  5. Kevin S. McCurley
    Cryptography and the Internet: Lessons and Challenges. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:50-56 [Conf]
  6. Arjen K. Lenstra
    Generating Standard DSA Signatures Without Long Inversion. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:57-64 [Conf]
  7. Erik De Win, Antoon Bosselaers, Servaas Vandenberghe, Peter De Gersem, Joos Vandewalle
    A Fast Software Implementation for Arithmetic Operations in GF(2n). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:65-76 [Conf]
  8. Lars R. Knudsen, Bart Preneel
    Hash Functions Based on Block Ciphers and Quaternary Codes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:77-90 [Conf]
  9. Kaisa Nyberg
    Generalized Feistel Networks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:91-104 [Conf]
  10. Philip Hawkes, Luke O'Connor
    On Applying Linear Cryptanalysis to IDEA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:105-115 [Conf]
  11. Chun-I Fan, Chin-Laung Lei
    A Multi-Recastable Ticket Scheme for Electronic Elections. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:116-124 [Conf]
  12. Markus Michels, Patrick Horster
    Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:125-132 [Conf]
  13. Jianying Zhou, Dieter Gollmann
    Observations on Non-repudiation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:133-144 [Conf]
  14. Daniel Bleichenbacher, Ueli M. Maurer
    On the Efficiency of One-Time Digital Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:145-158 [Conf]
  15. Kouichi Sakurai
    A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:159-172 [Conf]
  16. Shigeo Tsujii
    Electronic Money and Key Management from Global and Regional Points of View. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:173-184 [Conf]
  17. Kazukuni Kobara, Hideki Imai
    Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:185-195 [Conf]
  18. Ueli M. Maurer, Stefan Wolf
    Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:196-209 [Conf]
  19. Valeri Korjik, D. Kushnir
    Key Sharing Based on the Wire-Tap Channel Type II Concept with Noisy Main Channel. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:210-217 [Conf]
  20. Kaoru Kurosawa, Takashi Satoh
    Generalization of Higher Order SAC to Vector Output Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:218-231 [Conf]
  21. Seongtaek Chee, Sangjin Lee, Daiki Lee, Soo Hak Sung
    On the Correlation Immune Functions and Their Nonlinearity. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:232-243 [Conf]
  22. Masayuki Abe, Eiichiro Fujisaki
    How to Date Blind Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:244-251 [Conf]
  23. David Pointcheval, Jacques Stern
    Provably Secure Blind Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:252-265 [Conf]
  24. David M'Raïhi
    Cost-Effective Payment Schemes with Privacy Regulation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:266-275 [Conf]
  25. Agnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis
    Mis-representation of Identities in E-cash Schemes and how to Prevent it. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:276-285 [Conf]
  26. Yair Frankel, Yiannis Tsiounis, Moti Yung
    "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:286-300 [Conf]
  27. Jacques Stern
    The Validation of Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:301-310 [Conf]
  28. Seungjoo Kim, Sungjun Park, Dongho Won
    Convertible Group Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:311-321 [Conf]
  29. Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto
    How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:322-333 [Conf]
  30. Markus Michels, Patrick Horster
    On the Risk of Disruption in Several Multiparty Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:334-345 [Conf]
  31. Willi Geiselmann, Dieter Gollmann
    Correlation Attacks on Cascades of Clock Controlled Shift Registers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:346-359 [Conf]
  32. Sangjin Lee, Seongtaek Chee, Sangjoon Park, Sung-Mo Park
    Conditional Correlation Attack on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:360-367 [Conf]
  33. Florent Chabaud, Jacques Stern
    The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:368-381 [Conf]
  34. James Cowie, Bruce Dodson, R. Marije Elkenbracht-Huizing, Arjen K. Lenstra, Peter L. Montgomery, Jörg Zayer
    A World Wide Number Field Sieve Factoring Record: On to 512 Bits. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:382-394 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002