EUROCRYPT A*

46 papers

YearTitle / Authors
1993Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings
Rainer A. Rueppel
1992A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function.
Babak Sadeghiyan, Josef Pieprzyk
1992A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance.
Jovan Dj. Golic, Slobodan V. Petrovic
1992A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme.
David Naccache
1992A New Method for Known Plaintext Attack of FEAL Cipher.
Mitsuru Matsui, Atsuhiro Yamagishi
1992A Note on Discrete Logorithms with Special Structure.
Rafi Heiman
1992A Remark on a Non-interactive Public-Key Distribution System.
Ueli M. Maurer, Yacov Yacobi
1992A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator.
Ueli M. Maurer
1992Attacks on Protocols for Server-Aided RSA Computation.
Birgit Pfitzmann, Michael Waidner
1992Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications.
Michael J. Beller, Yacov Yacobi
1992Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract).
Yair Frankel, Yvo Desmedt
1992Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence.
Miodrag J. Mihaljevic, Jovan Dj. Golic
1992Correlation via Linear Sequential Circuit Approximation of Combiners with memory.
Jovan Dj. Golic
1992Cryptographic Protocols Provably Secure Against Dynamic Adversaries.
Donald Beaver, Stuart Haber
1992Differential Cryptanalysis Mod 2^32 with Applications to MD5.
Thomas A. Berson
1992FFT Hashing is not Collision-free.
Thierry Baritaud, Henri Gilbert, Marc Girault
1992FFT-Hash II, Efficient Cryptographic Hashing.
Claus-Peter Schnorr
1992Factoring with an Oracle.
Ueli M. Maurer
1992Fast Exponentiation with Precomputation (Extended Abstract).
Ernest F. Brickell, Daniel M. Gordon, Kevin S. McCurley, David Bruce Wilson
1992Graph Decompositions and Secret Sharing Schemes.
Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro
1992Hash Function Based on Block Ciphers.
Xuejia Lai, James L. Massey
1992High-Speed Implementation Methods for RSA Scheme.
Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
1992How Intractable Is the Discrete Logarithm for a General Finite Group?
Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya
1992How to Break a "Secure" Oblivious Transfer Protocol.
Donald Beaver
1992How to Construct Pseudorandom and Super Pseudorandom Permutations from one Single Pseudorandom Function.
Jacques Patarin
1992How to Make Efficient Fail-stop Signatures.
Eugène van Heyst, Torben Pryds Pedersen
1992Information-Theoretic Bounds for Authentication Frauds.
Andrea Sgarro
1992Local Randomness in Candidate One-Way Functions.
Harald Niederreiter, Claus-Peter Schnorr
1992Massively Parallel Elliptic Curve Factorin.
Brandon Dixon, Arjen K. Lenstra
1992Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing.
Ivan Damgård
1992On the Construction of Highly Nonlinear Permutations.
Kaisa Nyberg
1992On the Development of a Fast Elliptic Curve Cryptosystem.
Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone
1992Public-Key Cryptosystems with Very Small Key Length.
Greg Harper, Alfred Menezes, Scott A. Vanstone
1992Resource Requirements for the Application of Addition Chains in Modulo Exponentiation.
Jörg Sauerbrey, Andreas Dietel
1992Secure Audio Teleconferencing: A Practical Solution.
Rafi Heiman
1992Secure Bit Commitment Function against Divertibility.
Kazuo Ohta, Tatsuaki Okamoto, Atsushi Fujioka
1992Secure Conference Key Distribution Schemes for Conspiracy Attack.
Kenji Koyama
1992Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract).
Lidong Chen, Ivan Damgård
1992Suffix Tree and String Complexity.
Luke O'Connor, Tim Snider
1992Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
1992The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel).
Yvo Desmedt, Peter Landrock, Arjen K. Lenstra, Kevin S. McCurley, Andrew M. Odlyzko, Rainer A. Rueppel, Miles E. Smid
1992The One-Round Functions of the DES Generate the Alternating Group.
Ralph Wernsdorf
1992Tools for Proving Zero Knowledge.
Ingrid Biehl, Johannes A. Buchmann, Bernd Meyer, Christian Thiel, Christoph Thiel
1992Transferred Cash Grows in Size.
David Chaum, Torben Pryds Pedersen
1992Uniform Results in Polynomial-Time Security.
Paul Barbaroux
1992Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol?
Jan-Hendrik Evertse, Eugène van Heyst