EUROCRYPT A*

49 papers

YearTitle / Authors
1991Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings
Ivan Damgård
1990A Cryptographic Library for the Motorola DSP56000.
Stephen R. Dussé, Burton S. Kaliski Jr.
1990A Known Plaintext Attack on Two-Key Triple Encryption.
Paul C. van Oorschot, Michael J. Wiener
1990A New Trapdoor in Knapsacks.
Valtteri Niemi
1990A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach.
Jovan Dj. Golic, Miodrag J. Mihaljevic
1990A Proposal for a New Block Encryption Standard.
Xuejia Lai, James L. Massey
1990A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party.
Ingemar Ingemarsson, Gustavus J. Simmons
1990A Provably-Secure Strongly-Randomized Cipher.
Ueli M. Maurer
1990A Remark on a Signature Scheme Where Forgery Can Be Proved.
Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner
1990A Remark on the Efficiency of Identification Schemes.
Mike Burmester
1990An Identity-based Identification Scheme Based on Discrete Logarithms Modulo a Composite Number.
Marc Girault
1990An Interactive Identification Scheme Based on Discrete Logarithms and Factoring.
Ernest F. Brickell, Kevin S. McCurley
1990Confirmation that Some Hash Functions Are Not Collision Free.
Shoji Miyaguchi, Kazuo Ohta, Masahiko Iwata
1990Constructions of Bent Functions and Difference Sets.
Kaisa Nyberg
1990Correlation Functions of Geometric Sequences.
Agnes Hui Chan, Mark Goresky, Andrew Klapper
1990Correlation Properties of Combiners with Memory in Stream Ciphers.
Willi Meier, Othmar Staffelbach
1990Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers.
Jacques Stern, Philippe Toffin
1990Cryptosystem for Group Oriented Cryptography.
Tzonelih Hwang
1990Distributed Primality Proving and the Primality of (2
François Morain
1990Essentially l-Fold Secure Authentication Systems.
Albrecht Beutelspacher, Ute Rosenbaum
1990Experimental Quantum Cryptography.
Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin
1990Exponentiating Faster with Addition Chains.
Yacov Yacobi
1990Factoring With Two Large Primes.
Arjen K. Lenstra, Mark S. Manasse
1990Fast Signature Generation With a Fiat Shamir-Like Scheme.
H. Ong, Claus-Peter Schnorr
1990General Public Key Residue Cryptosystems and Mental Poker Protocols.
Kaoru Kurosawa, Yutaka Katayama, Wakaha Ogata, Shigeo Tsujii
1990How to Construct Pseudorandom Permutations from Single Pseudorandom Functions.
Josef Pieprzyk
1990Implementation of a Key Exchange Protocol Using Some Real Quadratic Fields.
Renate Scheidler, Johannes Buchmann, Hugh C. Williams
1990Inverting the Pseudo Exponentiation.
Fritz Bauspieß, Hans-Joachim Knobloch, Peer Wichmann
1990Lower Bounds for Authentication Codes With Splitting.
Andrea Sgarro
1990Lower Bounds for the Linear Complexity of Sequences over Residue Rings.
Zong-Duo Dai, Thomas Beth, Dieter Gollmann
1990Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme.
Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama
1990Oblivous Transfer Protecting Secrecy.
Bert den Boer
1990On an Implementation of the Mohan-Adiga Algorithm.
Gisela Meister
1990On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2.
Ben J. M. Smeets, Peter Vanroose, Zhe-Xian Wan
1990On the Construction of Run Permuted Sequences.
Cees J. A. Jansen
1990On the Design of Provably Secure Cryptographic Hash Functions.
Alfredo De Santis, Moti Yung
1990On the Importance of Memory Resources in the Security of Key Exchange Protocols.
George I. Davida, Yvo Desmedt, René Peralta
1990Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery".
Louis C. Guillou, Jean-Jacques Quisquater, Michael Walker, Peter Landrock, Caroline Shafer
1990Propagation Characteristics of Boolean Functions.
Bart Preneel, Werner Van Leekwijck, Luc Van Linden, René Govaerts, Joos Vandewalle
1990Properties of Binary Functions.
Sheelagh Lloyd
1990Provably Secure Key-Updating Schemes in Identity-Based Systems.
Shinji Shinozaki, Toshiya Itoh, Atsushi Fujioka, Shigeo Tsujii
1990Public-Randomness in Public Key Cryptography.
Alfredo De Santis, Giuseppe Persiano
1990Software Run-Time Protection: A Cryptographic Issue.
Josep Domingo-Ferrer
1990The Linear Complexity Profile and the Jump Complexity of Keystream Sequences.
Harald Niederreiter
1990The MD4 Message Digest Algorithm (Abstract).
Burton S. Kaliski Jr.
1990VICTOR an Efficient RSA Hardware Implementation.
Holger Orup, Erik Svendsen, Erik Andreasen
1990Which New RSA Signatures Can Be Computed From Some Given RSA Signatures?
Jan-Hendrik Evertse, Eugène van Heyst
1990Yvo Desmedt: All Languages in NP Have Divertible Zero-Knowledge Proofs and Arguments Under Cryptographic Assumptions.
Mike Burmester
1990Zero-Knowledge Undeniable Signatures.
David Chaum