CRYPTO A*

37 papers

YearTitle / Authors
1995A Key Escrow System with Warrant Bounds.
Arjen K. Lenstra, Peter Winkler, Yacov Yacobi
1995A Key-schedule Weakness in SAFER K-64.
Lars R. Knudsen
1995A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems.
Silvio Micali, Ray Sidney
1995Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings
Don Coppersmith
1995An Efficient Divisible Electronic Cash Scheme.
Tatsuaki Okamoto
1995Bucket Hashing and its Application to Fast Message Authentication.
Phillip Rogaway
1995Collusion-Secure Fingerprinting for Digital Data (Extended Abstract).
Dan Boneh, James Shaw
1995Committed Oblivious Transfer and Private Multi-Party Computation.
Claude Crépeau, Jeroen van de Graaf, Alain Tapp
1995Cryptanalysis Based on 2-Adic Rational Approximation.
Andrew Klapper, Mark Goresky
1995Cryptanalysis of the Immunized LL Public Key Systems.
Yair Frankel, Moti Yung
1995Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88.
Jacques Patarin
1995Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver.
Shai Halevi
1995Escrow Encryption Systems Visited: Attacks, Analysis and Designs.
Yair Frankel, Moti Yung
1995Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract).
Joe Kilian, Frank Thomson Leighton
1995Fast Key Exchange with Elliptic Curve Systems.
Richard Schroeppel, Hilarie K. Orman, Sean W. O'Malley, Oliver Spatscheck
1995Fast Server-Aided RSA Signatures Secure Against Active Attacks.
Philippe Béguin, Jean-Jacques Quisquater
1995General Perfect Secret Sharing Schemes.
G. R. Blakley, Gregory Kabatianskii
1995Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs.
Ivan Damgård, Oded Goldreich, Tatsuaki Okamoto, Avi Wigderson
1995How to Break Shamir's Asymmetric Basis.
Thorsten Theobald
1995Improved Efficient Arguments (Preliminary Version).
Joe Kilian
1995Improving the Search Algorithm for the Best Linear Expression.
Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
1995MDx-MAC and Building Fast MACs from Hash Functions.
Bart Preneel, Paul C. van Oorschot
1995NFS with Four Large Primes: An Explosive Experiment.
Bruce Dodson, Arjen K. Lenstra
1995On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm.
Burton S. Kaliski Jr., Yiqun Lisa Yin
1995On the Security of the Gollmann Cascades.
Sangjoon Park, Sangjin Lee, Seung-Cheol Goh
1995On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols.
Dominic Mayers
1995Precomputing Oblivious Transfer.
Donald Beaver
1995Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
1995Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract).
Dan Boneh, Richard J. Lipton
1995Robustness Principles for Public Key Protocols.
Ross J. Anderson, Roger M. Needham
1995Secret Sharing with Public Reconstruction (Extended Abstract).
Amos Beimel, Benny Chor
1995Secure Signature Schemes based on Interactive Protocols.
Ronald Cramer, Ivan Damgård
1995Security and Performance of Server-Aided RSA Computation Protocols.
Chae Hoon Lim, Pil Joong Lee
1995Some Remarks on Lucas-Based Cryptosystems.
Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra
1995Threshold DSS Signatures without a Trusted Party.
Susan K. Langford
1995XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions.
Mihir Bellare, Roch Guérin, Phillip Rogaway
1995t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes.
Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata