


default search action
EUROCRYPT 1993: Lofthus, Norway
- Tor Helleseth:

Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings. Lecture Notes in Computer Science 765, Springer 1994, ISBN 3-540-57600-2
Authentication
- Thomas Johansson

, Gregory Kabatianskii, Ben J. M. Smeets:
On the Relation between A-Codes and Codes Correcting Independent Errors. 1-11 - Reihaneh Safavi-Naini, Leonid M. Tombak:

Optimal Authentication Systems. 12-27
Public Key
- Brandon Dixon, Arjen K. Lenstra:

Factoring Integers Using SIMD Sieves. 28-39 - N. Demytko:

A New Elliptic Curve Based Analogue of RSA. 40-49 - Simon R. Blackburn, Sean Murphy, Jacques Stern:

Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups. 50-54
Block Ciphers
- Kaisa Nyberg:

Differentially Uniform Mappings for Cryptography. 55-64 - Thomas Beth, Cunsheng Ding:

On Almost Perfect Nonlinear Permutations. 65-76 - Claude Carlet:

Two New Classes of Bent Functions. 77-101 - Thomas W. Cusick:

Boolean Functions Satisfying a Higher Order Strict Avalanche Criterion. 102-117
Secret Sharing
- Marco Carpentieri, Alfredo De Santis

, Ugo Vaccaro:
Size of Shares and Probability of Cheating in Threshold Schemes. 118-125 - Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata

, Shigeo Tsujii:
Nonperfect Secret Sharing Schemes and Matroids. 126-141
Stream Ciphers
- Ernst S. Selmer:

From the Memoirs of a Norwegian Cryptologist. 142-150 - Rainer Göttfert, Harald Niederreiter:

On the Linear Complexity of Products of Shift-Register Sequences. 151-158 - Joan Daemen, René Govaerts, Joos Vandewalle:

Resynchronization Weaknesses in Synchronous Stream Ciphers. 159-167 - Richard A. Games, Joseph J. Rushanan:

Blind Synchronization of m-Sequnces with Even Span. 168-180 - Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng

:
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). 181-199
Digital Signature
- Ivan Damgård:

Practical and Provably Secure Release of a Secret and Exchange of Signatures. 200-217 - Gustavus J. Simmons:

Subliminal Communication is Easy Using the DSA. 218-232 - David Naccache:

Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme. 233-239
Protocols I
- Colin Boyd, Wenbo Mao:

On a Limitation of BAN Logic. 240-247 - Choonsik Park, Kazutomo Itoh, Kaoru Kurosawa:

Efficient Anonymous Channel and All/Nothing Election Scheme. 248-259 - Josep Domingo-Ferrer:

Untransferable Rights in a Client-Independent Server Environment. 260-266 - Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung:

Interactive Hashing Simplifies Zero-Knowledge Protocol Design. 267-273
Hash Functions
- Josh Cohen Benaloh, Michael de Mare:

One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract). 274-285 - Ivan Damgård, Lars R. Knudsen:

The Breaking of the AR Hash Function. 286-292 - Bert den Boer, Antoon Bosselaers:

Collisions for the Compressin Function of MD5. 293-304 - Jacques Patarin:

How to Find and Avoid Collisions for the Knapsack Hash Function. 305-317
Payment Systems
- Niels Ferguson:

Single Term Off-Line Coins. 318-328 - Ronald Cramer, Torben P. Pedersen:

Improved Privacy in Wallets with Observers (Extended Abstract). 329-343 - Stefan Brands, David Chaum:

Distance-Bounding Protocols (Extended Abstract). 344-359
Cryptanalysis
- Luke O'Connor:

On the Distribution of Characteristics in Bijective Mappings. 360-370 - Willi Meier:

On the Security of the IDEA Block Cipher. 371-385 - Mitsuru Matsui:

Linear Cryptanalysis Method for DES Cipher. 386-397 - Eli Biham:

New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract). 398-409
Protocols II
- Gilles Brassard, Louis Salvail:

Secret-Key Reconciliation by Public Discussion. 410-423 - Donald Beaver, Nicol So:

Global, Unpredictable Bit Generation Without Broadcast. 424-434
Rump Session
- Peter de Rooij:

On Schnorr's Preprocessing for Digital Signature Schemes. 435-439 - Mike Burmester:

Cryptanalysis of the Chang-Wu-Chen Key Distribution System. 440-442 - Paul C. van Oorschot

:
An Alternate Explanation of two BAN-logic "failures". 443-447 - Gustavus J. Simmons:

The Consequences of Trust in Shared Secret Schemes. 448-452 - G. Hornauer, W. Stephan, Ralph Wernsdorf:

Markov Ciphers and Alternating Groups. 453-460 - Choonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, Shigeo Tsujii:

On Key Distribution and Authentication in Mobile Radio Networks. 461-465

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














