ASIACRYPT A

35 papers

YearTitle / Authors
1996"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash.
Yair Frankel, Yiannis Tsiounis, Moti Yung
1996A Fast Software Implementation for Arithmetic Operations in GF(2
Erik De Win, Antoon Bosselaers, Servaas Vandenberghe, Peter De Gersem, Joos Vandewalle
1996A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes.
Kouichi Sakurai
1996A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves.
Atsuko Miyaji
1996A Multi-Recastable Ticket Scheme for Electronic Elections.
Chun-I Fan, Chin-Laung Lei
1996A World Wide Number Field Sieve Factoring Record: On to 512 Bits.
James Cowie, Bruce Dodson, R. Marije Elkenbracht-Huizing, Arjen K. Lenstra, Peter L. Montgomery, Jörg Zayer
1996Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings
Kwangjo Kim, Tsutomu Matsumoto
1996Authenticated Multi-Party Key Agreement.
Mike Just, Serge Vaudenay
1996Conditional Correlation Attack on Nonlinear Filter Generators.
Sangjin Lee, Seongtaek Chee, Sangjoon Park, Sung-Mo Park
1996Convertible Group Signatures.
Seungjoo Kim, Sungjun Park, Dongho Won
1996Correlation Attacks on Cascades of Clock Controlled Shift Registers.
Willi Geiselmann, Dieter Gollmann
1996Cost-Effective Payment Schemes with Privacy Regulation.
David M'Raïhi
1996Cryptographic Protocols Based on Real-Quadratic A-fields.
Ingrid Biehl, Bernd Meyer, Christoph Thiel
1996Cryptography and the Internet: Lessons and Challenges.
Kevin S. McCurley
1996Electronic Money and Key Management from Global and Regional Points of View.
Shigeo Tsujii
1996Generalization of Higher Order SAC to Vector Output Boolean Functions.
Kaoru Kurosawa, Takashi Satoh
1996Generalized Feistel Networks.
Kaisa Nyberg
1996Generating Standard DSA Signatures Without Long Inversion.
Arjen K. Lenstra
1996Hash Functions Based on Block Ciphers and Quaternary Codes.
Lars R. Knudsen, Bart Preneel
1996How to Date Blind Signatures.
Masayuki Abe, Eiichiro Fujisaki
1996How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem.
Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto
1996Key Sharing Based on the Wire-Tap Channel Type II Concept with Noisy Main Channel.
Valeri Korjik, D. Kushnir
1996Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification.
Kazukuni Kobara, Hideki Imai
1996Minding your p's and q's.
Ross J. Anderson, Serge Vaudenay
1996Mis-representation of Identities in E-cash Schemes and how to Prevent it.
Agnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis
1996Observations on Non-repudiation.
Jianying Zhou, Dieter Gollmann
1996On Applying Linear Cryptanalysis to IDEA.
Philip Hawkes, Luke O'Connor
1996On the Correlation Immune Functions and Their Nonlinearity.
Seongtaek Chee, Sangjin Lee, Daiki Lee, Soo Hak Sung
1996On the Efficiency of One-Time Digital Signatures.
Daniel Bleichenbacher, Ueli M. Maurer
1996On the Risk of Disruption in Several Multiparty Signature Schemes.
Markus Michels, Patrick Horster
1996Provably Secure Blind Signature Schemes.
David Pointcheval, Jacques Stern
1996Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme.
Markus Michels, Patrick Horster
1996The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes.
Florent Chabaud, Jacques Stern
1996The Validation of Cryptographic Algorithms.
Jacques Stern
1996Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible.
Ueli M. Maurer, Stefan Wolf