ASIACRYPT A

47 papers

YearTitle / Authors
1993Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings
Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto
19914 Move Perfect ZKIP of Knowledge with No Assumption.
Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai
1991A Construction of a Cioher From a Single Pseudorandom Permutation.
Shimon Even, Yishay Mansour
1991A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme.
Kazuo Ohta, Tatsuaki Okamoto
1991A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton.
Joan Daemen, René Govaerts, Joos Vandewalle
1991A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract).
Matthew Kwan, Josef Pieprzyk
1991A Generalized Secret Sharing Scheme With Cheater Detection.
Hung-Yu Lin, Lein Harn
1991A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference.
Toshinobu Kaneko
1991A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis.
Hiroshi Miyano
1991A Multi-Purpose Proof System - for Identity and Membership Proofs.
Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai
1991A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems.
Joan Feigenbaum, Rafail Ostrovsky
1991A Secure Analog Speech Scrambler Using the Discrete Cosine Transform.
Bruce Goldburg, Ed Dawson, S. Sridharan
1991An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers.
Yvo Desmedt, Mike Burmester
1991An Extensin of Zero-Knowledge Proofs and Its Applications.
Tatsuaki Okamoto
1991Any Language in IP Has a Divertable ZKIP.
Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya
1991Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91.
Joan Daemen, Antoon Bosselaers, René Govaerts, Joos Vandewalle
1991Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC.
Kwangjo Kim
1991Cryptanalysis of Another Knapsack Cryptosystem.
Antoine Joux, Jacques Stern
1991Cryptanalysis of LOKI.
Lars R. Knudsen
1991Cryptanalysis of Several Conference Key Distribution Schemes.
Atsushi Shimbo, Shin-ichi Kawamura
1991Cryptography and Machine Learning.
Ronald L. Rivest
1991Extended Majority Voting and Private-Key Algebraic-Code Encryptions.
Joost Meijers, Johan van Tilburg
1991Feistel Type Authentication Codes.
Reihaneh Safavi-Naini
1991Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract).
Marie-Jeanne Toussaint
1991Generalized Threshold Cryptosystems.
Chi-Sung Laih, Lein Harn
1991How to Construct A Family of Strong One Way Permutations.
Babak Sadeghiyan, Yuliang Zheng, Josef Pieprzyk
1991IC-Cards and Telecommunication Services.
Jun-ichi Mizusawa
1991Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI.
Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry
1991Limitations of the Even-Mansour Construction.
Joan Daemen
1991On Claw Free Families.
Wakaha Ogata, Kaoru Kurosawa
1991On NIST's Proposed Digital Signature Standard.
Ronald L. Rivest
1991On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations.
Babak Sadeghiyan, Josef Pieprzyk
1991On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets.
Lein Harn, Hung-Yu Lin
1991On Ordinary Elliptic Curve Cryptosystems.
Atsuko Miyaji
1991On the Complexity of Constant Round ZKIP of Possession of Knowledge.
Toshiya Itoh, Kouichi Sakurai
1991On the Power of Two-Local Random Reductions.
Lance Fortnow, Mario Szegedy
1991Optima Perfect Randomizers.
Josef Pieprzyk, Babak Sadeghiyan
1991Privacy, Cryptographic Pseudonyms, and The State of Health.
Stig Fr. Mjølsnes
1991Research Activities on Cryptology in Korea.
Man Y. Rhee
1991Results of Switching-Closure-Test on FEAL (Extended Abstract).
Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi
1991Revealing Information with Partial Period Correlations (Extended Abstract).
Andrew Klapper, Mark Goresky
1991Sibling Intractable Function Families and Their Applications (Extended Abstract).
Yuliang Zheng, Thomas Hardjono, Josef Pieprzyk
1991Simultaneous Attacks in Differential Cryptanalysis (Getting More Pairs Per Encryption).
Matthew Kwan
1991Speeding up Prime Number Generation.
Jørgen Brandt, Ivan Damgård, Peter Landrock
1991The Data Base of Selected Permutations (Extended Abstract).
Jun-Hui Yang, Zong-Duo Dai, Kencheng Zeng
1991The Transition from Mechanisms to Electronic Computers, 1940 to 1950.
Donald W. Davies
1991Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.
Chi-Sung Laih, Sung-Ming Yen, Lein Harn