ASIACRYPT A

37 papers

YearTitle / Authors
1995Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings
Josef Pieprzyk, Reihaneh Safavi-Naini
1994A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function.
Miodrag J. Mihaljevic
1994A Digital Signature Scheme Based on Linear Error-correcting Block Codes.
Mohssen Alabbadi, Stephen B. Wicker
1994A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms.
Peter Smith, Christopher Skinner
1994A Unified Markow Approach to Differential and Linear Cryptanalysis.
Luke O'Connor, Jovan Dj. Golic
1994Attacking the SL
Chris Charnes, Josef Pieprzyk
1994Can One Design a Signature Scheme Based on Error-Correctin Codes?
Jacques Stern
1994Collisions and Inversions for Damgård's Whole Hash Function.
Jacques Patarin
1994Combinatorial Interpretation of Secret Sharing Schemes.
Kaoru Kurosawa, Koji Okada
1994Combinatorial Structure of A-codes with r-fold Security.
Reihaneh Safavi-Naini, Leonid M. Tombak
1994Cryptanalysis of Multiple Modes of Operation.
Eli Biham
1994DESV-1: A Variation of the Data Encryption Standard (DES).
Gary Carter, Andrew J. Clark, Lauren Nielsen
1994Design and Analysis of Key Exchange Protocols via Secure Channel Identification.
Colin Boyd, Wenbo Mao
1994Efficient Electronic Money (Extended Abstract).
Yacov Yacobi
1994Factoring: The DNA Solution.
Donald Beaver
1994Formal Verification of Cryptographic Protocols: A Survey.
Catherine A. Meadows
1994Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources.
Masayuki Abe, Hikaru Morita
1994How to Prevent Buying of Votes in Computer Elections.
Valtteri Niemi, Ari Renvall
1994How to Strengthen DES Using Existing Hardware.
Eli Biham, Alex Biryukov
1994Incidence Structures for Key Sharing (Extended Abstract).
Tsutomu Matsumoto
1994Information Security Aspects of Spread Spectrum Systems.
Hideki Imai
1994Intrinsic Statistical Weakness of Keystream Generators.
Jovan Dj. Golic
1994Linear Cryptanalysis of LOKI and s
Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui
1994Low Exponent Attack against Elliptic Curve RSA.
Kaoru Kurosawa, Koji Okada, Shigeo Tsujii
1994Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes.
Koji Okada, Kaoru Kurosawa
1994Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications.
Patrick Horster, Markus Michels, Holger Petersen
1994Multifeature Security through Homomorphic Encryption.
Thomas Beth
1994Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography.
Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester
1994On Sharing Many Secrets (Extended Abstract).
Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
1994On the Linear Complexity of Nonlinear Filtered PN-sequences.
Amparo Fúster-Sabater, Pino Caballero-Gil
1994Secure Acceleration of DSS Signatures Using Insecure Server.
Philippe Béguin, Jean-Jacques Quisquater
1994Security of the Center in Key Distribution Schemes.
Kaoru Kurosawa, Koji Okada, Keiichi Sakano
1994Semi-bent Functions.
Seongtaek Chee, Sangjin Lee, Kwangjo Kim
1994Some Cryptographic Properties of Exponential Functions.
Xingong Chang, Zong-Duo Dai, Guang Gong
1994Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract).
Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
1994The Magic Words are Squeamish Ossifrage.
Derek Atkins, Michael Graff, Arjen K. Lenstra, Paul C. Leyland
1994Zero-Knowledge Proofs of Computational Power in the Shared String Model.
Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano