default search action
EUROCRYPT 1993: Lofthus, Norway
- Tor Helleseth:
Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings. Lecture Notes in Computer Science 765, Springer 1994, ISBN 3-540-57600-2
Authentication
- Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets:
On the Relation between A-Codes and Codes Correcting Independent Errors. 1-11 - Reihaneh Safavi-Naini, Leonid M. Tombak:
Optimal Authentication Systems. 12-27
Public Key
- Brandon Dixon, Arjen K. Lenstra:
Factoring Integers Using SIMD Sieves. 28-39 - N. Demytko:
A New Elliptic Curve Based Analogue of RSA. 40-49 - Simon R. Blackburn, Sean Murphy, Jacques Stern:
Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups. 50-54
Block Ciphers
- Kaisa Nyberg:
Differentially Uniform Mappings for Cryptography. 55-64 - Thomas Beth, Cunsheng Ding:
On Almost Perfect Nonlinear Permutations. 65-76 - Claude Carlet:
Two New Classes of Bent Functions. 77-101 - Thomas W. Cusick:
Boolean Functions Satisfying a Higher Order Strict Avalanche Criterion. 102-117
Secret Sharing
- Marco Carpentieri, Alfredo De Santis, Ugo Vaccaro:
Size of Shares and Probability of Cheating in Threshold Schemes. 118-125 - Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii:
Nonperfect Secret Sharing Schemes and Matroids. 126-141
Stream Ciphers
- Ernst S. Selmer:
From the Memoirs of a Norwegian Cryptologist. 142-150 - Rainer Göttfert, Harald Niederreiter:
On the Linear Complexity of Products of Shift-Register Sequences. 151-158 - Joan Daemen, René Govaerts, Joos Vandewalle:
Resynchronization Weaknesses in Synchronous Stream Ciphers. 159-167 - Richard A. Games, Joseph J. Rushanan:
Blind Synchronization of m-Sequnces with Even Span. 168-180 - Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). 181-199
Digital Signature
- Ivan Damgård:
Practical and Provably Secure Release of a Secret and Exchange of Signatures. 200-217 - Gustavus J. Simmons:
Subliminal Communication is Easy Using the DSA. 218-232 - David Naccache:
Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme. 233-239
Protocols I
- Colin Boyd, Wenbo Mao:
On a Limitation of BAN Logic. 240-247 - Choonsik Park, Kazutomo Itoh, Kaoru Kurosawa:
Efficient Anonymous Channel and All/Nothing Election Scheme. 248-259 - Josep Domingo-Ferrer:
Untransferable Rights in a Client-Independent Server Environment. 260-266 - Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung:
Interactive Hashing Simplifies Zero-Knowledge Protocol Design. 267-273
Hash Functions
- Josh Cohen Benaloh, Michael de Mare:
One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract). 274-285 - Ivan Damgård, Lars R. Knudsen:
The Breaking of the AR Hash Function. 286-292 - Bert den Boer, Antoon Bosselaers:
Collisions for the Compressin Function of MD5. 293-304 - Jacques Patarin:
How to Find and Avoid Collisions for the Knapsack Hash Function. 305-317
Payment Systems
- Niels Ferguson:
Single Term Off-Line Coins. 318-328 - Ronald Cramer, Torben P. Pedersen:
Improved Privacy in Wallets with Observers (Extended Abstract). 329-343 - Stefan Brands, David Chaum:
Distance-Bounding Protocols (Extended Abstract). 344-359
Cryptanalysis
- Luke O'Connor:
On the Distribution of Characteristics in Bijective Mappings. 360-370 - Willi Meier:
On the Security of the IDEA Block Cipher. 371-385 - Mitsuru Matsui:
Linear Cryptanalysis Method for DES Cipher. 386-397 - Eli Biham:
New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract). 398-409
Protocols II
- Gilles Brassard, Louis Salvail:
Secret-Key Reconciliation by Public Discussion. 410-423 - Donald Beaver, Nicol So:
Global, Unpredictable Bit Generation Without Broadcast. 424-434
Rump Session
- Peter de Rooij:
On Schnorr's Preprocessing for Digital Signature Schemes. 435-439 - Mike Burmester:
Cryptanalysis of the Chang-Wu-Chen Key Distribution System. 440-442 - Paul C. van Oorschot:
An Alternate Explanation of two BAN-logic "failures". 443-447 - Gustavus J. Simmons:
The Consequences of Trust in Shared Secret Schemes. 448-452 - G. Hornauer, W. Stephan, Ralph Wernsdorf:
Markov Ciphers and Alternating Groups. 453-460 - Choonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, Shigeo Tsujii:
On Key Distribution and Authentication in Mobile Radio Networks. 461-465
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.