EUROCRYPT A*

35 papers

YearTitle / Authors
1996A Public Key Cryptosystem Based on Elliptic Curves over Z/nZ Equivalent to Factoring.
Bernd Meyer, Volker Müller
1996Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding
Ueli M. Maurer
1996An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding.
Jean-Bernard Fischer, Jacques Stern
1996Asymmetric Fingerprinting (Extended Abstract).
Birgit Pfitzmann, Matthias Schunter
1996Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions.
Xian-Mo Zhang, Yuliang Zheng
1996Construction of t-Resilient Functions over a Finite Alphabet.
Paul Camion, Anne Canteaut
1996Designated Verifier Proofs and Their Applications.
Markus Jakobsson, Kazue Sako, Russell Impagliazzo
1996Efficient Multiplicative Sharing Schemes.
Simon R. Blackburn, Mike Burmester, Yvo Desmedt, Peter R. Wild
1996Equivocable Oblivious Transfer.
Donald Beaver
1996Fast Low Order Approximation of Cryptographic Functions.
Jovan Dj. Golic
1996Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known.
Don Coppersmith
1996Finding a Small Root of a Univariate Modular Equation.
Don Coppersmith
1996Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel.
William Aiello, Ramarathnam Venkatesan
1996Generating EIGamal Signatures Without Knowing the Secret Key.
Daniel Bleichenbacher
1996Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms.
Jacques Patarin
1996Homomorphisms of Secret Sharing Schemes: A Tool for Verifiable Signature Sharing.
Mike Burmester
1996Low-Exponent RSA with Related Messages.
Don Coppersmith, Matthew K. Franklin, Jacques Patarin, Michael K. Reiter
1996Multi-Autority Secret-Ballot Elections with Linear Work.
Ronald Cramer, Matthew K. Franklin, Berry Schoenmakers, Moti Yung
1996New Convertible Undeniable Signature Schemes.
Ivan Damgård, Torben P. Pedersen
1996New Modular Multiplication Algorithms for Fast Modular Exponentiation.
Seong-Min Hong, Sang-Yeop Oh, Hyunsoo Yoon
1996Non-Linear Approximations in Linear Cryptanalysis.
Lars R. Knudsen, Matthew J. B. Robshaw
1996On Diffie-Hellman Key Agreement with Short Exponents.
Paul C. van Oorschot, Michael J. Wiener
1996On the Difficulty of Software Key Escrow.
Lars R. Knudsen, Torben P. Pedersen
1996On the Existence of Secure Feedback Registers (Extended Abstract).
Andrew Klapper
1996On the Security of Two MAC Algorithms.
Bart Preneel, Paul C. van Oorschot
1996On the Security of a Practical Identification Scheme.
Victor Shoup
1996Optimum Secret Sharing Scheme Secure against Cheating.
Wakaha Ogata, Kaoru Kurosawa
1996Public Key Encryption and Signature Schemes Based on Polynomials over Zn.
Jörg Schwenk, Jörg Eisfeld
1996Publicly Verifiable Secret Sharing.
Markus Stadler
1996Robust Threshold DSS Signatures.
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
1996Security Proofs for Signature Schemes.
David Pointcheval, Jacques Stern
1996Session Key Distribution Using Smart Cards.
Victor Shoup, Aviel D. Rubin
1996Short Discrete Proofs.
Joan Boyar, René Peralta
1996The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin.
Mihir Bellare, Phillip Rogaway
1996The Security of the Gabidulin Public Key Cryptosystem.
Keith Gibson