EUROCRYPT A*

41 papers

YearTitle / Authors
1988A Fast Modular Arithmetic Algorithm Using a Residue Table (Extended Abstract).
Shin-ichi Kawamura, Kyoko Hirano
1988A Generalized Birthday Attack.
Marc Girault, Robert Cohen, Mireille Campana
1988A Measure of Semiequivocation.
Andrea Sgarro
1988A New Class of Nonlinear Functions for Running-key Generators (Extended Abstract).
Shu Tezuka
1988A New Probabilistic Encryption Scheme.
He Jingmin, Lu Kaicheng
1988A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory.
Louis C. Guillou, Jean-Jacques Quisquater
1988A Probabilistic Primality test Based on the Properties of Certain Generalized Lucas Numbers.
Adina di Porto, Piero Filipponi
1988A Smart Card Implementation of the Fiat-Shamir Identification Scheme.
Hans-Joachim Knobloch
1988A Universal Algorithm for Homophonic Coding.
Christoph G. Günther
1988Advances in Cryptology - EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings
Christoph G. Günther
1988An Interactive Data Exchange Protocol Based on Discrete Exponentiation.
Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone
1988An Observation on the Security of McEliece's Public-Key Cryptosystem.
Pil Joong Lee, Ernest F. Brickell
1988Anonymous and Verifiable Registration in Databases.
Jørgen Brandt, Ivan Damgård, Peter Landrock
1988Authentication Codes with Multiple Arbiters (Extended Abstract).
Ernest F. Brickell, Douglas R. Stinson
1988Cryptanalysis of F.E.A.L.
Bert den Boer
1988Efficient Zero-Knowledge Identification Scheme for Smart Cards.
Thomas Beth
1988Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA.
David Chaum
1988Factorization of Large Integers on a Massively Parallel Computer.
James A. Davis, Diane B. Holdridge
1988Fast Correlation Attacks on Stream Ciphers (Extended Abstract).
Willi Meier, Othmar Staffelbach
1988Fast Exponentiation in
Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone
1988Fast RSA-Hardware: Dream or Reality?
Frank Hoornaert, Marc Decroos, Joos Vandewalle, René Govaerts
1988How to Break Okamoto's Cryptosystem by Reducing Lattice Bases.
Brigitte Vallée, Marc Girault, Philippe Toffin
1988Key Agreements Based on Function Composition.
Rainer A. Rueppel
1988Linear Recurring m-Arrays.
Dongdai Lin, Mulan Liu
1988Lock-In Effect in Cascades of Clock-Controlled Shift-Registers.
William G. Chambers, Dieter Gollmann
1988Manipulations and Errors, Detection and Localization.
Philippe Godlewski, Paul Camion
1988On the Construction of Random Number Generators and Random Function Generators.
Claus-Peter Schnorr
1988Passports and Visas Versus IDS (Extended Abstract).
George I. Davida, Yvo Desmedt
1988Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity.
Svein J. Knapskog
1988Proof of Massey's Conjectured Algorithm.
Cunsheng Ding
1988Properties of the Euler Totient Function Modulo 24 and Some of its Cryptographic Implications.
Raouf N. Gorgui-Naguib, Satnam Singh Dlay
1988Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption.
Tsutomu Matsumoto, Hideki Imai
1988Security of Improved Identity-Based Conference Key Distribution Systems.
Kenji Koyama, Kazuo Ohta
1988Some Applications of Multiple Key Ciphers.
Colin Boyd
1988Some Constructions for Authentication-Secrecy Codes.
Marijke De Soete
1988Some New Classes of Geometric Threshold Schemes.
Marijke De Soete, Klaus Vedder
1988Subliminal-Free Authentication and Signature (Extended Abstract).
Yvo Desmedt
1988Substantial Number of Cryptographic Keys and Its Application to Encryption Designs.
Eiji Okamoto
1988The Probabilistic Theory of Linear Complexity.
Harald Niederreiter
1988Windmill Generators: A Generalization and an Observation of How Many There Are.
Ben J. M. Smeets, William G. Chambers
1988Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts.
Gustavus J. Simmons, George B. Purdy