CRYPTO A*

44 papers

YearTitle / Authors
1993Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings
Ernest F. Brickell
1992A High-Speed DES Implementation for Network Applications.
Hans Eberle
1992A Quadratic Sieve on the n-Dimensional Cube.
René Peralta
1992An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Z
Tatsuaki Okamoto, Atsushi Fujioka, Eiichiro Fujisaki
1992An l-Span Generalized Secret Sharing Scheme.
Lein Harn, Hung-Yu Lin
1992Certifying Cryptographic Tools: The Case of Trapdoor Permutations.
Mihir Bellare, Moti Yung
1992Content-Addressable Search Engines and DES-like Systems.
Peter C. Wayner
1992DES is not a Group.
Keith W. Campbell, Michael J. Wiener
1992Designing and Detecting Trapdoors for Discrete Log Cryptosystems.
Daniel M. Gordon
1992Differential Cryptanalysis of the Full 16-Round DES.
Eli Biham, Adi Shamir
1992Efficient Multiplication on Certain Nonsupersingular Elliptic Curves.
Willi Meier, Othmar Staffelbach
1992FFT-Hash-II is not yet Collision-free.
Serge Vaudenay
1992Fair Public-Key Cryptosystems.
Silvio Micali
1992Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract).
Shafi Goldwasser, Rafail Ostrovsky
1992Iterative Characteristics of DES and s²-DES.
Lars R. Knudsen
1992Kid Krypto.
Michael R. Fellows, Neal Koblitz
1992Low Communication 2-Prover Zero-Knowledge Proofs for NP.
Cynthia Dwork, Uriel Feige, Joe Kilian, Moni Naor, Shmuel Safra
1992Making Electronic Refunds Safer.
Rafael Hirschfeld
1992Massively Parallel Computation of Discrete Logarithms.
Daniel M. Gordon, Kevin S. McCurley
1992Necessary and Sufficient Conditions For Collision-Free Hashing.
Alexander Russell
1992New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract).
Eugène van Heijst, Torben P. Pedersen, Birgit Pfitzmann
1992New General Lower Bounds on the Information Rate of Secret Sharing Schemes.
Douglas R. Stinson
1992Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract).
Yair Frankel, Yvo Desmedt, Mike Burmester
1992On Defining Proofs of Knowledge.
Mihir Bellare, Oded Goldreich
1992On Generation of Probable Primes By Incremental Search.
Jørgen Brandt, Ivan Damgård
1992On the Design of SP Networks From an Information Theoretic Point of View.
M. Sivabalan, Stafford E. Tavares, Lloyd E. Peppard
1992On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract).
Kouichi Sakurai, Toshiya Itoh
1992On the Information Rate of Secret Sharing Schemes (Extended Abstract).
Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro
1992On the Security of the Permuted Kernel Identification Scheme.
Thierry Baritaud, Mireille Campana, Pascal Chauvaud, Henri Gilbert
1992Partially-Bent Functions.
Claude Carlet
1992Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract).
Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung
1992Perfectly-Secure Key Distribution for Dynamic Conferences.
Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung
1992Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract).
Yuliang Zheng, Jennifer Seberry
1992Pricing via Processing or Combatting Junk Mail.
Cynthia Dwork, Moni Naor
1992Protocols for Secret Key Agreement by Public Discussion Based on Common Information.
Ueli M. Maurer
1992Provable Security Against Differential Cryptanalysis.
Kaisa Nyberg, Lars R. Knudsen
1992Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes.
Tatsuaki Okamoto
1992Provably Unforgeable Signatures.
Jurjen N. Bos, David Chaum
1992Pubic Randomness in Cryptography.
Amir Herzberg, Michael Luby
1992Response to Comments of the NIST Proposed Digital Signature Standard.
Miles E. Smid, Dennis K. Branstad
1992Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method.
Kenji Koyama, Yukio Tsuruoka
1992Threshold Schemes with Disenrollment.
Bob Blakley, G. R. Blakley, Agnes Hui Chan, James L. Massey
1992Universally Ideal Secret Sharing Schemes (Preliminary Version).
Amos Beimel, Benny Chor
1992Wallet Databases with Observers.
David Chaum, Torben Pryds Pedersen