EUROCRYPT A*

43 papers

YearTitle / Authors
1994Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings
Tor Helleseth
1993A New Elliptic Curve Based Analogue of RSA.
N. Demytko
1993An Alternate Explanation of two BAN-logic "failures".
Paul C. van Oorschot
1993Blind Synchronization of m-Sequnces with Even Span.
Richard A. Games, Joseph J. Rushanan
1993Boolean Functions Satisfying a Higher Order Strict Avalanche Criterion.
Thomas W. Cusick
1993Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme.
David Naccache
1993Collisions for the Compressin Function of MD5.
Bert den Boer, Antoon Bosselaers
1993Cryptanalysis of the Chang-Wu-Chen Key Distribution System.
Mike Burmester
1993Differentially Uniform Mappings for Cryptography.
Kaisa Nyberg
1993Distance-Bounding Protocols (Extended Abstract).
Stefan Brands, David Chaum
1993Efficient Anonymous Channel and All/Nothing Election Scheme.
Choonsik Park, Kazutomo Itoh, Kaoru Kurosawa
1993Factoring Integers Using SIMD Sieves.
Brandon Dixon, Arjen K. Lenstra
1993From the Memoirs of a Norwegian Cryptologist.
Ernst S. Selmer
1993Global, Unpredictable Bit Generation Without Broadcast.
Donald Beaver, Nicol So
1993How to Find and Avoid Collisions for the Knapsack Hash Function.
Jacques Patarin
1993Improved Privacy in Wallets with Observers (Extended Abstract).
Ronald Cramer, Torben P. Pedersen
1993Interactive Hashing Simplifies Zero-Knowledge Protocol Design.
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung
1993Linear Cryptanalysis Method for DES Cipher.
Mitsuru Matsui
1993Markov Ciphers and Alternating Groups.
G. Hornauer, W. Stephan, Ralph Wernsdorf
1993New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract).
Eli Biham
1993Nonperfect Secret Sharing Schemes and Matroids.
Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii
1993On Almost Perfect Nonlinear Permutations.
Thomas Beth, Cunsheng Ding
1993On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract).
Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
1993On Key Distribution and Authentication in Mobile Radio Networks.
Choonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, Shigeo Tsujii
1993On Schnorr's Preprocessing for Digital Signature Schemes.
Peter de Rooij
1993On a Limitation of BAN Logic.
Colin Boyd, Wenbo Mao
1993On the Distribution of Characteristics in Bijective Mappings.
Luke O'Connor
1993On the Linear Complexity of Products of Shift-Register Sequences.
Rainer Göttfert, Harald Niederreiter
1993On the Relation between A-Codes and Codes Correcting Independent Errors.
Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets
1993On the Security of the IDEA Block Cipher.
Willi Meier
1993One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract).
Josh Cohen Benaloh, Michael de Mare
1993Optimal Authentication Systems.
Reihaneh Safavi-Naini, Leonid M. Tombak
1993Practical and Provably Secure Release of a Secret and Exchange of Signatures.
Ivan Damgård
1993Resynchronization Weaknesses in Synchronous Stream Ciphers.
Joan Daemen, René Govaerts, Joos Vandewalle
1993Secret-Key Reconciliation by Public Discussion.
Gilles Brassard, Louis Salvail
1993Single Term Off-Line Coins.
Niels Ferguson
1993Size of Shares and Probability of Cheating in Threshold Schemes.
Marco Carpentieri, Alfredo De Santis, Ugo Vaccaro
1993Subliminal Communication is Easy Using the DSA.
Gustavus J. Simmons
1993The Breaking of the AR Hash Function.
Ivan Damgård, Lars R. Knudsen
1993The Consequences of Trust in Shared Secret Schemes.
Gustavus J. Simmons
1993Two New Classes of Bent Functions.
Claude Carlet
1993Untransferable Rights in a Client-Independent Server Environment.
Josep Domingo-Ferrer
1993Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups.
Simon R. Blackburn, Sean Murphy, Jacques Stern