


default search action
EUROCRYPT 1992: Balatonfüred, Hungary
- Rainer A. Rueppel:

Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings. Lecture Notes in Computer Science 658, Springer 1993, ISBN 3-540-56413-6
Secret Sharing
- Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro:

Graph Decompositions and Secret Sharing Schemes. 1-24 - Yair Frankel, Yvo Desmedt:

Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract). 25-34
Hash Functions
- Thierry Baritaud, Henri Gilbert, Marc Girault:

FFT Hashing is not Collision-free. 35-44 - Claus-Peter Schnorr:

FFT-Hash II, Efficient Cryptographic Hashing. 45-54 - Xuejia Lai, James L. Massey:

Hash Function Based on Block Ciphers. 55-70 - Thomas A. Berson:

Differential Cryptanalysis Mod 2^32 with Applications to MD5. 71-80
Block Ciphers
- Mitsuru Matsui, Atsuhiro Yamagishi:

A New Method for Known Plaintext Attack of FEAL Cipher. 81-91 - Kaisa Nyberg:

On the Construction of Highly Nonlinear Permutations. 92-98 - Ralph Wernsdorf:

The One-Round Functions of the DES Generate the Alternating Group. 99-112
Stream Ciphers
- Jovan Dj. Golic:

Correlation via Linear Sequential Circuit Approximation of Combiners with memory. 113-123 - Miodrag J. Mihaljevic, Jovan Dj. Golic:

Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. 124-137 - Luke O'Connor, Tim Snider:

Suffix Tree and String Complexity. 138-152
Public Key I
- Birgit Pfitzmann, Michael Waidner

:
Attacks on Protocols for Server-Aided RSA Computation. 153-162 - Greg Harper, Alfred Menezes, Scott A. Vanstone:

Public-Key Cryptosystems with Very Small Key Length. 163-173 - Jörg Sauerbrey, Andreas Dietel:

Resource Requirements for the Application of Addition Chains in Modulo Exponentiation. 174-182
Factoring
- Brandon Dixon, Arjen K. Lenstra:

Massively Parallel Elliptic Curve Factorin. 183-193
Panel
- Yvo Desmedt, Peter Landrock, Arjen K. Lenstra, Kevin S. McCurley

, Andrew M. Odlyzko, Rainer A. Rueppel, Miles E. Smid:
The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel). 194-199
Public Key II
- Ernest F. Brickell, Daniel M. Gordon, Kevin S. McCurley

, David Bruce Wilson:
Fast Exponentiation with Precomputation (Extended Abstract). 200-207 - Michael J. Beller, Yacov Yacobi:

Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. 208-220 - Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai:

High-Speed Implementation Methods for RSA Scheme. 221-238
Pseudo-random Permutation Generators
- Ueli M. Maurer:

A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator. 239-255 - Jacques Patarin:

How to Construct Pseudorandom and Super Pseudorandom Permutations from one Single Pseudorandom Function. 256-266 - Babak Sadeghiyan, Josef Pieprzyk

:
A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function. 267-284
Complexity Theory and Cryptography I
- Donald Beaver:

How to Break a "Secure" Oblivious Transfer Protocol. 285-296 - Paul Barbaroux:

Uniform Results in Polynomial-Time Security. 297-306 - Donald Beaver, Stuart Haber:

Cryptographic Protocols Provably Secure Against Dynamic Adversaries. 307-323
Zero-Knowledge
- Kazuo Ohta, Tatsuaki Okamoto, Atsushi Fujioka:

Secure Bit Commitment Function against Divertibility. 324-340 - Ivan Damgård:

Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing. 341-355 - Ingrid Biehl, Johannes A. Buchmann, Bernd Meyer, Christian Thiel, Christoph Thiel:

Tools for Proving Zero Knowledge. 356-365
Digital Signatures and Electronic Cash
- Eugène van Heyst, Torben Pryds Pedersen:

How to Make Efficient Fail-stop Signatures. 366-377 - Jan-Hendrik Evertse, Eugène van Heyst:

Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol? 378-389 - David Chaum, Torben Pryds Pedersen:

Transferred Cash Grows in Size. 390-407
Complexity Theory and Cryptography II
- Harald Niederreiter, Claus-Peter Schnorr:

Local Randomness in Candidate One-Way Functions. 408-419 - Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya:

How Intractable Is the Discrete Logarithm for a General Finite Group? 420-428 - Ueli M. Maurer:

Factoring with an Oracle. 429-436
Applications
- Rafi Heiman:

Secure Audio Teleconferencing: A Practical Solution. 437-448
Selected Papers from the Rump Session
- Kenji Koyama:

Secure Conference Key Distribution Schemes for Conspiracy Attack. 449-453 - Rafi Heiman:

A Note on Discrete Logorithms with Special Structure. 454-457 - Ueli M. Maurer, Yacov Yacobi:

A Remark on a Non-interactive Public-Key Distribution System. 458-460 - Lidong Chen, Ivan Damgård:

Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract). 461-466 - Andrea Sgarro:

Information-Theoretic Bounds for Authentication Frauds. 467-471 - Jovan Dj. Golic, Slobodan V. Petrovic:

A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. 472-476 - Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai:

Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). 477-481 - Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone:

On the Development of a Fast Elliptic Curve Cryptosystem. 482-487 - David Naccache:

A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme. 488-491

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














