default search action
14th CRYPTO 1994: Santa Barbara, California, USA
- Yvo Desmedt:
Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings. Lecture Notes in Computer Science 839, Springer 1994, ISBN 3-540-58333-5
Block Ciphers: Differential and Linear Cryptanaysis
- Mitsuru Matsui:
The First Experimental Cryptanalysis of the Data Encryption Standard. 1-11 - Kazuo Ohta, Kazumaro Aoki:
Linear Cryptanalysis of the Fast Data Encipherment Algorithm. 12-16 - Susan K. Langford, Martin E. Hellman:
Differential-Linear Cryptanalysis. 17-25 - Burton S. Kaliski Jr., Matthew J. B. Robshaw:
Linear Cryptanalysis Using Multiple Approximations. 26-39
Schemes Based on New Problems
- Jean-Pierre Tillich, Gilles Zémor:
Hashing with SL_2. 40-49 - Jinhui Chao, Kazuo Tanada, Shigeo Tsujii:
Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks. 50-55 - Ingrid Biehl, Johannes A. Buchmann, Christoph Thiel:
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders. 56-60
Signatures I
- Tatsuaki Okamoto:
Designated Confirmer Signatures and Public-Key Encryption are Equivalent. 61-74 - Daniel Bleichenbacher, Ueli M. Maurer:
Directed Acyclic Graphs, One-way Functions and Digital Signatures. 75-82 - Olivier Delos, Jean-Jacques Quisquater:
An Identity-Based Signature Scheme with Bounded Life-Span. 83-94
Implementation and Hardware Aspects
- Chae Hoon Lim, Pil Joong Lee:
More Flexible Exponentiation with Precomputation. 95-107 - Tamás Horváth, Spyros S. Magliveras, Tran van Trung:
A Parallel Permutation Multiplier for a PGM Crypto-chip. 108-113 - Don Davis, Ross Ihaka, Philip Fenstermacher:
Cryptographic Randomness from Air Turbulence in Disk Drives. 114-120
Authentication and Secret Sharing
- Christian Gehrmann:
Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol. 121-128 - Hugo Krawczyk:
LFSR-based Hashing and Authentication. 129-139 - Kaoru Kurosawa:
New Bound on Authentication Code with Arbitration. 140-149 - Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro:
Multi-Secret Sharing Schemes. 150-163
Zero Knowledge
- Jacques Stern:
Designing Identification Schemes with Keys of Short Size. 164-173 - Ronald Cramer, Ivan Damgård, Berry Schoenmakers:
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. 174-187 - Toshiya Itoh, Yuji Ohta, Hiroki Shizuya:
Language Dependent Secure Bit Commitment. 188-201 - Marc Girault, Jacques Stern:
On the Length of Cryptographic Hash-Values Used in Identification Schemes. 202-215
Sigantures II
- Mihir Bellare, Oded Goldreich, Shafi Goldwasser:
Incremental Cryptography: The Case of Hashing and Signing. 216-233 - Cynthia Dwork, Moni Naor:
An Efficient Existentially Unforgeable Signature Scheme and its Applications. 234-246
Combinatorics and its Applications
- Jürgen Bierbrauer, K. Gopalakrishnan, Douglas R. Stinson:
Bounds for Resilient Functions and Orthogonal Arrays. 247-256 - Benny Chor, Amos Fiat, Moni Naor:
Tracing Traitors. 257-270
Number Theory
- Ueli M. Maurer:
Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms. 271-281 - Preda Mihailescu:
Fast Generation of Provable Primes Using Search in Arithmetic Progressions. 282-293
Cryptanaysis and Protocol Failures
- Don Coppersmith:
Attack on the Cryptographic Scheme NIKS-TAS. 294-307 - Mike Burmester:
On the Risk of Opening Distributed Keys. 308-317 - Thomas Beth, Dejan E. Lazic, A. Mathias:
Cryptanalysis of Cryptosystems Based on Remote Chaos Replication. 318-331
Pseudo-Random Generation
- James L. Massey, Shirlei Serconek:
A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences. 332-340
Block Ciphers: Design and Cryptanaysis
- Mihir Bellare, Joe Kilian, Phillip Rogaway:
The Security of Cipher Block Chaining. 341-358 - Henri Gilbert, Pascal Chauvaud:
A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem. 359-368 - Yukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu:
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext. 369-382 - Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Pitfalls in Designing Substitution Boxes (Extended Abstract). 383-396
Secure Computations and Protocols
- Eyal Kushilevitz, Adi Rosén:
A Randomnesss-Rounds Tradeoff in Private Computation. 397-410 - Kazue Sako, Joe Kilian:
Secure Voting Using Partially Compatible Homomorphisms. 411-424 - Ran Canetti, Amir Herzberg:
Maintaining Security in the Presence of Transient Faults. 425-438
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.