EUROCRYPT A*

35 papers

YearTitle / Authors
1997A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost.
Mihir Bellare, Daniele Micciancio
1997A New Public-Key Cryptosystem.
David Naccache, Jacques Stern
1997A Secure and Optimally Efficient Multi-Authority Election Scheme.
Ronald Cramer, Rosario Gennaro, Berry Schoenmakers
1997Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding
Walter Fumy
1997Almost k-wise Independent Sample Spaces and Their Cryptologic Applications.
Kaoru Kurosawa, Thomas Johansson, Douglas R. Stinson
1997Anonymous Fingerprinting.
Birgit Pfitzmann, Michael Waidner
1997Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals.
Eric R. Verheul, Henk C. A. van Tilborg
1997Bucket Hashing with a Small Key Size.
Thomas Johansson
1997Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees.
Niko Baric, Birgit Pfitzmann
1997Combinatorial Properties of Basic Encryption Operations (Extended Abstract).
Thilo Zieschang
1997Cryptanalysis of Alleged A5 Stream Cipher.
Jovan Dj. Golic
1997Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria.
Kaoru Kurosawa, Takashi Satoh
1997Distributed "Magic Ink" Signatures.
Markus Jakobsson, Moti Yung
1997Efficient Cryptographic Protocols Based on Noisy Channels.
Claude Crépeau
1997Efficient and Generalized Group Signatures.
Jan Camenisch
1997Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2
Christof Paar, Pedro Soria-Rodriguez
1997Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation.
Ronald Cramer, Ivan Damgård
1997Finding Good Random Elliptic Curves for Cryptosystems Defined over F
Reynald Lercier
1997Incremental Cryptography and Memory Checkers.
Marc Fischlin
1997Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion.
Ueli M. Maurer
1997Kleptography: Using Cryptography Against Cryptography.
Adam L. Young, Moti Yung
1997Lattice Attacks on NTRU.
Don Coppersmith, Adi Shamir
1997Linear Statistical Weakness of Alleged RC4 Keystream Generator.
Jovan Dj. Golic
1997Lower Bounds for Discrete Logarithms and Related Problems.
Victor Shoup
1997More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings.
Claude Carlet
1997Oblivious Transfers and Privacy Amplification.
Gilles Brassard, Claude Crépeau
1997On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract).
Dan Boneh, Richard A. DeMillo, Richard J. Lipton
1997Rapid Demonstration of Linear Relations Connected by Boolean Operators.
Stefan Brands
1997Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function.
Mihir Bellare, Markus Jakobsson, Moti Yung
1997SHA: A Design for Parallel Architectures?
Antoon Bosselaers, René Govaerts, Joos Vandewalle
1997Selective Forgery of RSA Signatures Using Redundancy.
Marc Girault, Jean-François Misarsky
1997Smooth Entropy and Rényi Entropy.
Christian Cachin
1997Stronger Security Proofs for RSA and Rabin Bits.
Roger Fischlin, Claus-Peter Schnorr
1997The GCHQ Protocol and Its Problems.
Ross J. Anderson, Michael Roe
1997Two Attacks on Reduced IDEA.
Johan Borst, Lars R. Knudsen, Vincent Rijmen