CRYPTO A*

39 papers

YearTitle / Authors
1994A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem.
Henri Gilbert, Pascal Chauvaud
1994A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences.
James L. Massey, Shirlei Serconek
1994A Parallel Permutation Multiplier for a PGM Crypto-chip.
Tamás Horváth, Spyros S. Magliveras, Tran van Trung
1994A Randomnesss-Rounds Tradeoff in Private Computation.
Eyal Kushilevitz, Adi Rosén
1994Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings
Yvo Desmedt
1994An Efficient Existentially Unforgeable Signature Scheme and its Applications.
Cynthia Dwork, Moni Naor
1994An Identity-Based Signature Scheme with Bounded Life-Span.
Olivier Delos, Jean-Jacques Quisquater
1994Attack on the Cryptographic Scheme NIKS-TAS.
Don Coppersmith
1994Bounds for Resilient Functions and Orthogonal Arrays.
Jürgen Bierbrauer, K. Gopalakrishnan, Douglas R. Stinson
1994Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext.
Yukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu
1994Cryptanalysis of Cryptosystems Based on Remote Chaos Replication.
Thomas Beth, Dejan E. Lazic, A. Mathias
1994Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol.
Christian Gehrmann
1994Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders.
Ingrid Biehl, Johannes A. Buchmann, Christoph Thiel
1994Cryptographic Randomness from Air Turbulence in Disk Drives.
Don Davis, Ross Ihaka, Philip Fenstermacher
1994Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks.
Jinhui Chao, Kazuo Tanada, Shigeo Tsujii
1994Designated Confirmer Signatures and Public-Key Encryption are Equivalent.
Tatsuaki Okamoto
1994Designing Identification Schemes with Keys of Short Size.
Jacques Stern
1994Differential-Linear Cryptanalysis.
Susan K. Langford, Martin E. Hellman
1994Directed Acyclic Graphs, One-way Functions and Digital Signatures.
Daniel Bleichenbacher, Ueli M. Maurer
1994Fast Generation of Provable Primes Using Search in Arithmetic Progressions.
Preda Mihailescu
1994Hashing with SL_2.
Jean-Pierre Tillich, Gilles Zémor
1994Incremental Cryptography: The Case of Hashing and Signing.
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
1994LFSR-based Hashing and Authentication.
Hugo Krawczyk
1994Language Dependent Secure Bit Commitment.
Toshiya Itoh, Yuji Ohta, Hiroki Shizuya
1994Linear Cryptanalysis Using Multiple Approximations.
Burton S. Kaliski Jr., Matthew J. B. Robshaw
1994Linear Cryptanalysis of the Fast Data Encipherment Algorithm.
Kazuo Ohta, Kazumaro Aoki
1994Maintaining Security in the Presence of Transient Faults.
Ran Canetti, Amir Herzberg
1994More Flexible Exponentiation with Precomputation.
Chae Hoon Lim, Pil Joong Lee
1994Multi-Secret Sharing Schemes.
Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro
1994New Bound on Authentication Code with Arbitration.
Kaoru Kurosawa
1994On the Length of Cryptographic Hash-Values Used in Identification Schemes.
Marc Girault, Jacques Stern
1994On the Risk of Opening Distributed Keys.
Mike Burmester
1994Pitfalls in Designing Substitution Boxes (Extended Abstract).
Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
1994Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols.
Ronald Cramer, Ivan Damgård, Berry Schoenmakers
1994Secure Voting Using Partially Compatible Homomorphisms.
Kazue Sako, Joe Kilian
1994The First Experimental Cryptanalysis of the Data Encryption Standard.
Mitsuru Matsui
1994The Security of Cipher Block Chaining.
Mihir Bellare, Joe Kilian, Phillip Rogaway
1994Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms
Ueli M. Maurer
1994Tracing Traitors.
Benny Chor, Amos Fiat, Moni Naor