EUROCRYPT A*

48 papers

YearTitle / Authors
1995Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings
Alfredo De Santis
1994A Linear Construction of Perfect Secret Sharing Schemes.
Marten van Dijk
1994A Multiple-Iterated Trapdoor for Dense Compact Knapsacks.
Glenn A. Orton
1994A Practical Attack against Knapsack based Hash Functions (Extended Abstract).
Antoine Joux, Louis Granboulan
1994A Secure and Efficient Conference Key Distribution System (Extended Abstract).
Mike Burmester, Yvo Desmedt
1994A Systematic Attack on Clock Controlled Cascades.
Renato Menicocci
1994An Improvement of Davies' Attack on DES.
Eli Biham, Alex Biryukov
1994Authentication Codes in Plaintext and Chosen-content Attacks.
Reihaneh Safavi-Naini, Leonid M. Tombak
1994Black Box Cryptanalysis of Hash Networks Based on Multipermutations.
Claus-Peter Schnorr, Serge Vaudenay
1994Blackmailing using Undeniable Signatures.
Markus Jakobsson
1994Blind Signatures Based on the Discrete Logarithm Problem.
Jan Camenisch, Jean-Marc Piveteau, Markus Stadler
1994Breaking Efficient Anonymous Channel.
Birgit Pfitzmann
1994Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard.
David Naccache, David M'Raïhi, Serge Vaudenay, Dan Raphaeli
1994Comments on Soviet Encryption Algorithm.
Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng
1994Designated Confirmer Signatures.
David Chaum
1994Efficient Exponentiation using Procomputation and Vector Addition Chains.
Peter de Rooij
1994Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers.
Jovan Dj. Golic, Luke O'Connor
1994Feedback Registers Based on Ramified Extensions of the 2-Adic Numbers (Extended Abstract).
Mark Goresky, Andrew Klapper
1994Formal Requirements for Key Distribution Protocols.
Paul F. Syverson, Catherine Meadows
1994General Lower Bound for the Linear Complexity of the Product of Shift-Register Sequences.
Rainer Göttfert, Harald Niederreiter
1994How to Break and Repair Leighton and Micali's Key Agreement Protocol.
Yuliang Zheng
1994Linear Approximation of Block Ciphers.
Kaisa Nyberg
1994Linking Information Reconciliation and Privacy Amplification (Extended Abstract).
Christian Cachin, Ueli M. Maurer
1994Links Between Differential and Linear Cryptanalysis.
Florent Chabaud, Serge Vaudenay
1994MIMD-Factorisation on Hypercubes.
Frank Damm, F.-P. Heider, G. Wambach
1994Memory Efficient Variants of Public-Key Schemes for Smart Card Applications.
Adi Shamir
1994Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem.
Kaisa Nyberg, Rainer A. Rueppel
1994Methodology for Digital Money based on General Cryptographic Tools.
Stefano D'Amiano, Giovanni Di Crescenzo
1994Near Optimal Unconditionally Secure Authentication.
Richard Taylor
1994New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM.
Lars R. Knudsen, Xuejia Lai
1994New Group Signature Schemes (Extended Abstract).
Lidong Chen, Torben P. Pedersen
1994New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract).
Lars R. Knudsen
1994On A²-Codes Including Arbiter's Attacks.
Thomas Johansson, Ben J. M. Smeets
1994On Correlation Between the Order of S-boxes and the Strength of DES.
Mitsuru Matsui
1994On Matsui's Linear Cryptanalysis.
Eli Biham
1994On the Dealer's Randomness Required in Secret Sharing Schemes.
Carlo Blundo, Antonio Giorgio Gaggia, Douglas R. Stinson
1994On the Security of Some Cryptosystems Based on Error-correcting Codes.
Florent Chabaud
1994Optimal Asymmetric Encryption.
Mihir Bellare, Phillip Rogaway
1994Parallel Divertibility of Proofs of Knowledge (Extended Abstract).
Lidong Chen, Ivan Damgård, Torben P. Pedersen
1994Q-Deformed Quantum Cryptography.
Jaroslav Hruby
1994Relationships Among Nonlinear Criteria (Extended Abstract).
Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
1994Single-Term Divisible Electronic Coins.
Tony L. Eng, Tatsuaki Okamoto
1994Space Requirements for Broadcast Encryption.
Carlo Blundo, Antonella Cresti
1994The Blinding of Weak Signatures (Extended Abstract).
Matthew K. Franklin, Moti Yung
1994The Self-Shrinking Generator.
Willi Meier, Othmar Staffelbach
1994The Size of a Share Must Be Large.
László Csirmaz
1994Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders.
Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
1994Visual Cryptography.
Moni Naor, Adi Shamir