CRYPTO A*

31 papers

YearTitle / Authors
1996Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings
Neal Koblitz
1996Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract).
Dan Boneh, Richard J. Lipton
1996All Bits ax+b mod p are Hard (Extended Abstract).
Mats Näslund
1996Anonymous Communication and Anonymous Cash.
Daniel R. Simon
1996Asymmetric Cryptography with a Hidden Monomial.
Jacques Patarin
1996Diffie-Hellman Oracles.
Ueli M. Maurer, Stefan Wolf
1996Fast Hashing on the Pentium.
Antoon Bosselaers, René Govaerts, Joos Vandewalle
1996Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations.
Paul Camion, Anne Canteaut
1996Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes.
Dan Boneh, Ramarathnam Venkatesan
1996Hidden Collisions on DSS.
Serge Vaudenay
1996How to Protect DES Against Exhaustive Key Search.
Joe Kilian, Phillip Rogaway
1996Improved Differential Attacks on RC5.
Lars R. Knudsen, Willi Meier
1996Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude.
Paul C. van Oorschot, Michael J. Wiener
1996Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.
John Kelsey, Bruce Schneier, David A. Wagner
1996Keying Hash Functions for Message Authentication.
Mihir Bellare, Ran Canetti, Hugo Krawczyk
1996Linear Complexity of Periodic Sequences: A General Theory.
James L. Massey, Shirlei Serconek
1996New Generation of Secure and Practical RSA-Based Signatures.
Ronald Cramer, Ivan Damgård
1996New Results on Visual Cryptography.
Stefan Droste
1996On Fast and Provably Secure Message Authentication Based on Universal Hashing.
Victor Shoup
1996Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing.
Shai Halevi, Silvio Micali
1996Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers.
Markus Jakobsson, Moti Yung
1996Quantum Cryptography over Underground Optical Fibers.
Richard J. Hughes, Gabriel G. Luther, George L. Morgan, Charles G. Peterson, Charles M. Simmons
1996Quantum Key Distribution and String Oblivious Transfer in Noisy Channels.
Dominic Mayers
1996Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
1996Security of 2^t-Root Identification and Signatures.
Claus-Peter Schnorr
1996The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?
Adam L. Young, Moti Yung
1996Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.
Paul C. Kocher
1996Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution.
Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson
1996Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings.
Tor Helleseth, Thomas Johansson
1996Universal Hashing and Multiple Authentication.
Mustafa Atici, Douglas R. Stinson
1996Weakness in Some Threshold Cryptosystems.
Susan K. Langford