CRYPTO A*

41 papers

YearTitle / Authors
1994Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings
Douglas R. Stinson
1993A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity.
Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii
1993A New Identification Scheme Based on Syndrome Decoding.
Jacques Stern
1993A Subexponential Algorithm for Discrete Logarithms over All Finite Fields.
Leonard M. Adleman, Jonathan DeMarrais
1993An Implementation of the General Number Field Sieve.
Johannes A. Buchmann, J. Loho, J. Zayer
1993An Integrity Check Value Algorithm for Stream Ciphers.
Richard Taylor
1993Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks.
Chae Hoon Lim, Pil Joong Lee
1993Attacks on the Birational Permutation Signature Schemes.
Don Coppersmith, Jacques Stern, Serge Vaudenay
1993Broadcast Encryption.
Amos Fiat, Moni Naor
1993Codes for Interactive Authentication.
Peter Gemmell, Moni Naor
1993Comparison of Three Modular Reduction Functions.
Antoon Bosselaers, René Govaerts, Joos Vandewalle
1993Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds.
Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens
1993Cryptographic Primitives Based on Hard Learning Problems.
Avrim Blum, Merrick L. Furst, Michael J. Kearns, Richard J. Lipton
1993Differential Attack on Message Authentication Codes.
Kazuo Ohta, Mitsuru Matsui
1993Differential Cryptanalysis of Lucifer.
Ishai Ben-Aroya, Eli Biham
1993Discreet Solitary Games.
Claude Crépeau, Joe Kilian
1993Efficient Signature Schemes Based on Birational Permutations.
Adi Shamir
1993Entity Authentication and Key Distribution.
Mihir Bellare, Phillip Rogaway
1993Extensions of Single-term Coins.
Niels Ferguson
1993Fully Dynamic Secret Sharing Schemes.
Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro
1993Hash Functions Based on Block Ciphers: A Synthetic Approach.
Bart Preneel, René Govaerts, Joos Vandewalle
1993Improved Algorithms for the Permuted Kernel Problem.
Jacques Patarin, Pascal Chauvaud
1993Interaction in Key Distribution Schemes (Extended Abstract).
Amos Beimel, Benny Chor
1993Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract).
Ivan Damgård
1993Joint Encryption and Message-Efficient Secure Computation.
Matthew K. Franklin, Stuart Haber
1993Multisecret Threshold Schemes.
Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
1993Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract).
Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
1993On Families of Hash Functions via Geometric Codes and Concatenation.
Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets
1993On Message Proof Systems with Known Space Verifiers.
Yonatan Aumann, Uriel Feige
1993On the Construction of Perfect Authentication Codes that Permit Arbitration.
Thomas Johansson
1993On the Distribution of Characteristics in Composite Permutations.
Luke O'Connor
1993On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures.
Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann
1993On the Factorization of RSA-120.
Thomas F. Denny, Bruce Dodson, Arjen K. Lenstra, Mark S. Manasse
1993Remark on the Threshold RSA Signature Scheme.
Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
1993Secret Sharing Made Short.
Hugo Krawczyk
1993Secret Sharing and Perfect Zero Knowledge.
Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano
1993Secret-Key Agreement without Public-Key Cryptography.
Frank Thomson Leighton, Silvio Micali
1993Security of Iterated Hash Functions Based on Block Ciphers.
Walter Hohl, Xuejia Lai, Thomas Meier, Christian Waldvogel
1993The Shrinking Generator.
Don Coppersmith, Hugo Krawczyk, Yishay Mansour
1993Untraceable Off-line Cash in Wallets with Observers (Extended Abstract).
Stefan Brands
1993Weak Keys for IDEA.
Joan Daemen, René Govaerts, Joos Vandewalle