default search action
Search dblp for Publications
export results for "toc:db/conf/eurocrypt/eurocrypt88.bht:"
@inproceedings{DBLP:conf/eurocrypt/AgnewMV88, author = {Gordon B. Agnew and Ronald C. Mullin and Scott A. Vanstone}, editor = {Christoph G. G{\"{u}}nther}, title = {An Interactive Data Exchange Protocol Based on Discrete Exponentiation}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {159--166}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_13}, doi = {10.1007/3-540-45961-8\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgnewMV88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgnewMV88a, author = {Gordon B. Agnew and Ronald C. Mullin and Scott A. Vanstone}, editor = {Christoph G. G{\"{u}}nther}, title = {Fast Exponentiation in \emph{GF(2\({}^{\mbox{n}}\))}}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {251--255}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_22}, doi = {10.1007/3-540-45961-8\_22}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgnewMV88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Beth88, author = {Thomas Beth}, editor = {Christoph G. G{\"{u}}nther}, title = {Efficient Zero-Knowledge Identification Scheme for Smart Cards}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {77--84}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_7}, doi = {10.1007/3-540-45961-8\_7}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Beth88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Boer88, author = {Bert den Boer}, editor = {Christoph G. G{\"{u}}nther}, title = {Cryptanalysis of {F.E.A.L}}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {293--299}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_27}, doi = {10.1007/3-540-45961-8\_27}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Boer88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Boyd88, author = {Colin Boyd}, editor = {Christoph G. G{\"{u}}nther}, title = {Some Applications of Multiple Key Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {455--467}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_40}, doi = {10.1007/3-540-45961-8\_40}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Boyd88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrandtDL88, author = {J{\o}rgen Brandt and Ivan Damg{\aa}rd and Peter Landrock}, editor = {Christoph G. G{\"{u}}nther}, title = {Anonymous and Verifiable Registration in Databases}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {167--176}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_14}, doi = {10.1007/3-540-45961-8\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrandtDL88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrickellS88, author = {Ernest F. Brickell and Douglas R. Stinson}, editor = {Christoph G. G{\"{u}}nther}, title = {Authentication Codes with Multiple Arbiters (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {51--55}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_5}, doi = {10.1007/3-540-45961-8\_5}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrickellS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChambersG88, author = {William G. Chambers and Dieter Gollmann}, editor = {Christoph G. G{\"{u}}nther}, title = {Lock-In Effect in Cascades of Clock-Controlled Shift-Registers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {331--343}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_31}, doi = {10.1007/3-540-45961-8\_31}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChambersG88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Chaum88, author = {David Chaum}, editor = {Christoph G. G{\"{u}}nther}, title = {Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking {RSA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {177--182}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_15}, doi = {10.1007/3-540-45961-8\_15}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Chaum88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DavidaD88, author = {George I. Davida and Yvo Desmedt}, editor = {Christoph G. G{\"{u}}nther}, title = {Passports and Visas Versus {IDS} (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {183--188}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_16}, doi = {10.1007/3-540-45961-8\_16}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DavidaD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DavisH88, author = {James A. Davis and Diane B. Holdridge}, editor = {Christoph G. G{\"{u}}nther}, title = {Factorization of Large Integers on a Massively Parallel Computer}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {235--243}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_20}, doi = {10.1007/3-540-45961-8\_20}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DavisH88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Desmedt88, author = {Yvo Desmedt}, editor = {Christoph G. G{\"{u}}nther}, title = {Subliminal-Free Authentication and Signature (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {23--33}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_3}, doi = {10.1007/3-540-45961-8\_3}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Desmedt88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Ding88, author = {Cunsheng Ding}, editor = {Christoph G. G{\"{u}}nther}, title = {Proof of Massey's Conjectured Algorithm}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {345--349}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_32}, doi = {10.1007/3-540-45961-8\_32}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Ding88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GiraultCC88, author = {Marc Girault and Robert Cohen and Mireille Campana}, editor = {Christoph G. G{\"{u}}nther}, title = {A Generalized Birthday Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {129--156}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_12}, doi = {10.1007/3-540-45961-8\_12}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GiraultCC88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GiraultT88, author = {Brigitte Vall{\'{e}}e and Marc Girault and Philippe Toffin}, editor = {Christoph G. G{\"{u}}nther}, title = {How to Break Okamoto's Cryptosystem by Reducing Lattice Bases}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {281--291}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_26}, doi = {10.1007/3-540-45961-8\_26}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GiraultT88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GodlewskiC88, author = {Philippe Godlewski and Paul Camion}, editor = {Christoph G. G{\"{u}}nther}, title = {Manipulations and Errors, Detection and Localization}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {97--106}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_9}, doi = {10.1007/3-540-45961-8\_9}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GodlewskiC88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Gorgui-NaguibD88, author = {Raouf N. Gorgui{-}Naguib and Satnam Singh Dlay}, editor = {Christoph G. G{\"{u}}nther}, title = {Properties of the Euler Totient Function Modulo 24 and Some of its Cryptographic Implications}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {267--274}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_24}, doi = {10.1007/3-540-45961-8\_24}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Gorgui-NaguibD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GuillouQ88, author = {Louis C. Guillou and Jean{-}Jacques Quisquater}, editor = {Christoph G. G{\"{u}}nther}, title = {A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {123--128}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_11}, doi = {10.1007/3-540-45961-8\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GuillouQ88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Gunther88, author = {Christoph G. G{\"{u}}nther}, editor = {Christoph G. G{\"{u}}nther}, title = {A Universal Algorithm for Homophonic Coding}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {405--414}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_37}, doi = {10.1007/3-540-45961-8\_37}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Gunther88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HoornaertDVG88, author = {Frank Hoornaert and Marc Decroos and Joos Vandewalle and Ren{\'{e}} Govaerts}, editor = {Christoph G. G{\"{u}}nther}, title = {Fast RSA-Hardware: Dream or Reality?}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {257--264}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_23}, doi = {10.1007/3-540-45961-8\_23}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HoornaertDVG88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JingminK88, author = {He Jingmin and Lu Kaicheng}, editor = {Christoph G. G{\"{u}}nther}, title = {A New Probabilistic Encryption Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {415--418}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_38}, doi = {10.1007/3-540-45961-8\_38}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JingminK88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KawamuraH88, author = {Shin{-}ichi Kawamura and Kyoko Hirano}, editor = {Christoph G. G{\"{u}}nther}, title = {A Fast Modular Arithmetic Algorithm Using a Residue Table (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {245--250}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_21}, doi = {10.1007/3-540-45961-8\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KawamuraH88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Knapskog88, author = {Svein J. Knapskog}, editor = {Christoph G. G{\"{u}}nther}, title = {Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {107--122}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_10}, doi = {10.1007/3-540-45961-8\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Knapskog88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Knobloch88, author = {Hans{-}Joachim Knobloch}, editor = {Christoph G. G{\"{u}}nther}, title = {A Smart Card Implementation of the Fiat-Shamir Identification Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {87--95}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_8}, doi = {10.1007/3-540-45961-8\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Knobloch88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KoyamaO88, author = {Kenji Koyama and Kazuo Ohta}, editor = {Christoph G. G{\"{u}}nther}, title = {Security of Improved Identity-Based Conference Key Distribution Systems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {11--19}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_2}, doi = {10.1007/3-540-45961-8\_2}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KoyamaO88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeeB88, author = {Pil Joong Lee and Ernest F. Brickell}, editor = {Christoph G. G{\"{u}}nther}, title = {An Observation on the Security of McEliece's Public-Key Cryptosystem}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {275--280}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_25}, doi = {10.1007/3-540-45961-8\_25}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeeB88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LinL88, author = {Dongdai Lin and Mulan Liu}, editor = {Christoph G. G{\"{u}}nther}, title = {Linear Recurring m-Arrays}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {351--357}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_33}, doi = {10.1007/3-540-45961-8\_33}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LinL88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MatsumotoI88, author = {Tsutomu Matsumoto and Hideki Imai}, editor = {Christoph G. G{\"{u}}nther}, title = {Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {419--453}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_39}, doi = {10.1007/3-540-45961-8\_39}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MatsumotoI88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MeierS88, author = {Willi Meier and Othmar Staffelbach}, editor = {Christoph G. G{\"{u}}nther}, title = {Fast Correlation Attacks on Stream Ciphers (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {301--314}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_28}, doi = {10.1007/3-540-45961-8\_28}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MeierS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Niederreiter88, author = {Harald Niederreiter}, editor = {Christoph G. G{\"{u}}nther}, title = {The Probabilistic Theory of Linear Complexity}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {191--209}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_17}, doi = {10.1007/3-540-45961-8\_17}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Niederreiter88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Okamoto88, author = {Eiji Okamoto}, editor = {Christoph G. G{\"{u}}nther}, title = {Substantial Number of Cryptographic Keys and Its Application to Encryption Designs}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {361--373}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_34}, doi = {10.1007/3-540-45961-8\_34}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Okamoto88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PortoF88, author = {Adina di Porto and Piero Filipponi}, editor = {Christoph G. G{\"{u}}nther}, title = {A Probabilistic Primality test Based on the Properties of Certain Generalized Lucas Numbers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {211--223}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_18}, doi = {10.1007/3-540-45961-8\_18}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PortoF88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Rueppel88, author = {Rainer A. Rueppel}, editor = {Christoph G. G{\"{u}}nther}, title = {Key Agreements Based on Function Composition}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {3--10}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_1}, doi = {10.1007/3-540-45961-8\_1}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Rueppel88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Schnorr88, author = {Claus{-}Peter Schnorr}, editor = {Christoph G. G{\"{u}}nther}, title = {On the Construction of Random Number Generators and Random Function Generators}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {225--232}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_19}, doi = {10.1007/3-540-45961-8\_19}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Schnorr88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Sgarro88, author = {Andrea Sgarro}, editor = {Christoph G. G{\"{u}}nther}, title = {A Measure of Semiequivocation}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {375--387}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_35}, doi = {10.1007/3-540-45961-8\_35}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Sgarro88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SimmonsP88, author = {Gustavus J. Simmons and George B. Purdy}, editor = {Christoph G. G{\"{u}}nther}, title = {Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {35--49}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_4}, doi = {10.1007/3-540-45961-8\_4}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SimmonsP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SmeetsC88, author = {Ben J. M. Smeets and William G. Chambers}, editor = {Christoph G. G{\"{u}}nther}, title = {Windmill Generators: {A} Generalization and an Observation of How Many There Are}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {325--330}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_30}, doi = {10.1007/3-540-45961-8\_30}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SmeetsC88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Soete88, author = {Marijke De Soete}, editor = {Christoph G. G{\"{u}}nther}, title = {Some Constructions for Authentication-Secrecy Codes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {57--75}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_6}, doi = {10.1007/3-540-45961-8\_6}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Soete88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SoeteV88, author = {Marijke De Soete and Klaus Vedder}, editor = {Christoph G. G{\"{u}}nther}, title = {Some New Classes of Geometric Threshold Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {389--401}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_36}, doi = {10.1007/3-540-45961-8\_36}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SoeteV88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Tezuka88, author = {Shu Tezuka}, editor = {Christoph G. G{\"{u}}nther}, title = {A New Class of Nonlinear Functions for Running-key Generators (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {317--324}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_29}, doi = {10.1007/3-540-45961-8\_29}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Tezuka88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/88, editor = {Christoph G. G{\"{u}}nther}, title = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8}, doi = {10.1007/3-540-45961-8}, isbn = {3-540-50251-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.