default search action
13th CRYPTO 1993: Santa Barbara, California, USA
- Douglas R. Stinson:
Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings. Lecture Notes in Computer Science 773, Springer 1994, ISBN 3-540-57766-1
Cryptosystems
- Adi Shamir:
Efficient Signature Schemes Based on Birational Permutations. 1-12 - Jacques Stern:
A New Identification Scheme Based on Syndrome Decoding. 13-21 - Don Coppersmith, Hugo Krawczyk, Yishay Mansour:
The Shrinking Generator. 22-39
Stream Ciphers and Cryptographic Functions
- Richard Taylor:
An Integrity Check Value Algorithm for Stream Ciphers. 40-48 - Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). 49-60
Proof Systems and Zero-knowledge
- Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii:
A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity. 61-72 - Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
Secret Sharing and Perfect Zero Knowledge. 73-84 - Yonatan Aumann, Uriel Feige:
On Message Proof Systems with Known Space Verifiers. 85-99 - Ivan Damgård:
Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract). 100-109
Secret Sharing
- Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro:
Fully Dynamic Secret Sharing Schemes. 110-125 - Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Multisecret Threshold Schemes. 126-135 - Hugo Krawczyk:
Secret Sharing Made Short. 136-146
Number Theory and Algorithms
- Leonard M. Adleman, Jonathan DeMarrais:
A Subexponential Algorithm for Discrete Logarithms over All Finite Fields. 147-158 - Johannes A. Buchmann, J. Loho, J. Zayer:
An Implementation of the General Number Field Sieve. 159-165 - Thomas F. Denny, Bruce Dodson, Arjen K. Lenstra, Mark S. Manasse:
On the Factorization of RSA-120. 166-174 - Antoon Bosselaers, René Govaerts, Joos Vandewalle:
Comparison of Three Modular Reduction Functions. 175-186
Differential Cryptanalysis
- Ishai Ben-Aroya, Eli Biham:
Differential Cryptanalysis of Lucifer. 187-199 - Kazuo Ohta, Mitsuru Matsui:
Differential Attack on Message Authentication Codes. 200-211 - Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens:
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. 212-223 - Joan Daemen, René Govaerts, Joos Vandewalle:
Weak Keys for IDEA. 224-231
Complexity Theory
- Mihir Bellare, Phillip Rogaway:
Entity Authentication and Key Distribution. 232-249 - Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann:
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. 250-265 - Matthew K. Franklin, Stuart Haber:
Joint Encryption and Message-Efficient Secure Computation. 266-277 - Avrim Blum, Merrick L. Furst, Michael J. Kearns, Richard J. Lipton:
Cryptographic Primitives Based on Hard Learning Problems. 278-291
Applications
- Niels Ferguson:
Extensions of Single-term Coins. 292-301 - Stefan Brands:
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). 302-318 - Claude Crépeau, Joe Kilian:
Discreet Solitary Games. 319-330
Authentication Codes
- Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets:
On Families of Hash Functions via Geometric Codes and Concatenation. 331-342 - Thomas Johansson:
On the Construction of Perfect Authentication Codes that Permit Arbitration. 343-354 - Peter Gemmell, Moni Naor:
Codes for Interactive Authentication. 355-367
Hash Functions
- Bart Preneel, René Govaerts, Joos Vandewalle:
Hash Functions Based on Block Ciphers: A Synthetic Approach. 368-378 - Walter Hohl, Xuejia Lai, Thomas Meier, Christian Waldvogel:
Security of Iterated Hash Functions Based on Block Ciphers. 379-390
Cryptanalysis
- Jacques Patarin, Pascal Chauvaud:
Improved Algorithms for the Permuted Kernel Problem. 391-402 - Luke O'Connor:
On the Distribution of Characteristics in Composite Permutations. 403-412 - Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee:
Remark on the Threshold RSA Signature Scheme. 413-420 - Chae Hoon Lim, Pil Joong Lee:
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. 420-434 - Don Coppersmith, Jacques Stern, Serge Vaudenay:
Attacks on the Birational Permutation Signature Schemes. 435-443
Key Distribution
- Amos Beimel, Benny Chor:
Interaction in Key Distribution Schemes (Extended Abstract). 444-455 - Frank Thomson Leighton, Silvio Micali:
Secret-Key Agreement without Public-Key Cryptography. 456-479 - Amos Fiat, Moni Naor:
Broadcast Encryption. 480-491
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.