EUROCRYPT A*

35 papers

YearTitle / Authors
1995A
Jürgen Bierbrauer
1995A Block Lanczos Algorithm for Finding Dependencies Over GF(2).
Peter L. Montgomery
1995A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma.
Carlo Harpes, Gerhard Kramer, James L. Massey
1995A New Identification Scheme Based on the Perceptrons Problem.
David Pointcheval
1995Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding
Louis C. Guillou, Jean-Jacques Quisquater
1995An Implementation of the General Number Field Sieve to Compute Discrete Logarithms mod p.
Damian Weber
1995Anonymous NIZK Proofs of Knowledge with Preprocessing.
Stefano D'Amiano, Giovanni Di Crescenzo
1995Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers
David Naccache, David M'Raïhi, William Wolfowicz, Adina di Porto
1995Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction.
Claus-Peter Schnorr, Horst Helmut Hörner
1995Combinatorial Bounds for Authentication Codes with Arbitration.
Kaoru Kurosawa, Satoshi Obana
1995Convergence in Differential Distributions.
Luke O'Connor
1995Counting the Number of Points on Elliptic Curves over Finite Fields: Strategies and Performance.
Reynald Lercier, François Morain
1995Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract).
Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
1995Fair Blind Signatures.
Markus Stadler, Jean-Marc Piveteau, Jan Camenisch
1995Fast RSA-type Schemes Based on Singular Cubic Curves y
Kenji Koyama
1995General Short Computational Secret Sharing Schemes.
Philippe Béguin, Antonella Cresti
1995How to Break Another Provably Secure Payment System.
Birgit Pfitzmann, Matthias Schunter, Michael Waidner
1995Large Periods Nearly de Bruijn FCSR Sequences.
Andrew Klapper, Mark Goresky
1995New Hash Functions For Message Authentication.
Hugo Krawczyk
1995On Nonlinear Resilient Functions (Extended Abstract).
Xian-Mo Zhang, Yuliang Zheng
1995On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity.
Lidong Chen, Torben P. Pedersen
1995On the Matsumoto and Imai's Human Identification Scheme.
Chih-Hung Wang, Tzonelih Hwang, Jiun-Jang Tsai
1995Quantum Oblivious Mutual Identification.
Claude Crépeau, Louis Salvail
1995Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth.
Kazue Sako, Joe Kilian
1995Recycling Random Bits in Composed Perfect Zero-Knowledge.
Giovanni Di Crescenzo
1995Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems.
Kouichi Sakurai, Hiroki Shizuya
1995Restrictive Blinding of Secret-Key Certificates.
Stefan Brands
1995Ripping Coins For a Fair Exchange.
Markus Jakobsson
1995Secure Multiround Authentication Protocols.
Christian Gehrmann
1995Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract).
Yvo Desmedt
1995Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures.
Chae Hoon Lim, Pil Joong Lee
1995Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers.
Jovan Dj. Golic
1995Universal Hash Functions & Hard Core Bits.
Mats Näslund
1995Verifiable Secret Sharing as Secure Computation.
Rosario Gennaro, Silvio Micali
1995Verifiable Signature Sharing.
Matthew K. Franklin, Michael K. Reiter