default search action
Search dblp for Publications
export results for "toc:db/conf/eurocrypt/eurocrypt93.bht:"
@proceedings{DBLP:conf/eurocrypt/93, editor = {Tor Helleseth}, title = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48285-7}, doi = {10.1007/3-540-48285-7}, isbn = {3-540-57600-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeaverS93, author = {Donald Beaver and Nicol So}, editor = {Tor Helleseth}, title = {Global, Unpredictable Bit Generation Without Broadcast}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {424--434}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_36}, doi = {10.1007/3-540-48285-7\_36}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeaverS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BenalohM93, author = {Josh Cohen Benaloh and Michael de Mare}, editor = {Tor Helleseth}, title = {One-Way Accumulators: {A} Decentralized Alternative to Digital Sinatures (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {274--285}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_24}, doi = {10.1007/3-540-48285-7\_24}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BenalohM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BethD93, author = {Thomas Beth and Cunsheng Ding}, editor = {Tor Helleseth}, title = {On Almost Perfect Nonlinear Permutations}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {65--76}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_7}, doi = {10.1007/3-540-48285-7\_7}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BethD93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Biham93, author = {Eli Biham}, editor = {Tor Helleseth}, title = {New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {398--409}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_34}, doi = {10.1007/3-540-48285-7\_34}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Biham93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlackburnMS93, author = {Simon R. Blackburn and Sean Murphy and Jacques Stern}, editor = {Tor Helleseth}, title = {Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {50--54}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_5}, doi = {10.1007/3-540-48285-7\_5}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlackburnMS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BodyM93, author = {Colin Boyd and Wenbo Mao}, editor = {Tor Helleseth}, title = {On a Limitation of {BAN} Logic}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {240--247}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_20}, doi = {10.1007/3-540-48285-7\_20}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BodyM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoerB93, author = {Bert den Boer and Antoon Bosselaers}, editor = {Tor Helleseth}, title = {Collisions for the Compressin Function of {MD5}}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {293--304}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_26}, doi = {10.1007/3-540-48285-7\_26}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoerB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrandsC93, author = {Stefan Brands and David Chaum}, editor = {Tor Helleseth}, title = {Distance-Bounding Protocols (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {344--359}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_30}, doi = {10.1007/3-540-48285-7\_30}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrandsC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrassardS93, author = {Gilles Brassard and Louis Salvail}, editor = {Tor Helleseth}, title = {Secret-Key Reconciliation by Public Discussion}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {410--423}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_35}, doi = {10.1007/3-540-48285-7\_35}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrassardS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Burmester93, author = {Mike Burmester}, editor = {Tor Helleseth}, title = {Cryptanalysis of the Chang-Wu-Chen Key Distribution System}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {440--442}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_38}, doi = {10.1007/3-540-48285-7\_38}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Burmester93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Carlet93, author = {Claude Carlet}, editor = {Tor Helleseth}, title = {Two New Classes of Bent Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {77--101}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_8}, doi = {10.1007/3-540-48285-7\_8}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Carlet93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CarpentieriSV93, author = {Marco Carpentieri and Alfredo De Santis and Ugo Vaccaro}, editor = {Tor Helleseth}, title = {Size of Shares and Probability of Cheating in Threshold Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {118--125}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_10}, doi = {10.1007/3-540-48285-7\_10}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CarpentieriSV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerP93, author = {Ronald Cramer and Torben P. Pedersen}, editor = {Tor Helleseth}, title = {Improved Privacy in Wallets with Observers (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {329--343}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_29}, doi = {10.1007/3-540-48285-7\_29}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Cusick93, author = {Thomas W. Cusick}, editor = {Tor Helleseth}, title = {Boolean Functions Satisfying a Higher Order Strict Avalanche Criterion}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {102--117}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_9}, doi = {10.1007/3-540-48285-7\_9}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Cusick93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DaemenGV93, author = {Joan Daemen and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Tor Helleseth}, title = {Resynchronization Weaknesses in Synchronous Stream Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {159--167}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_14}, doi = {10.1007/3-540-48285-7\_14}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DaemenGV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Damgard93, author = {Ivan Damg{\aa}rd}, editor = {Tor Helleseth}, title = {Practical and Provably Secure Release of a Secret and Exchange of Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {200--217}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_17}, doi = {10.1007/3-540-48285-7\_17}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Damgard93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardK93, author = {Ivan Damg{\aa}rd and Lars R. Knudsen}, editor = {Tor Helleseth}, title = {The Breaking of the {AR} Hash Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {286--292}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_25}, doi = {10.1007/3-540-48285-7\_25}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Demytko93, author = {N. Demytko}, editor = {Tor Helleseth}, title = {A New Elliptic Curve Based Analogue of {RSA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {40--49}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_4}, doi = {10.1007/3-540-48285-7\_4}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Demytko93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DixonL93, author = {Brandon Dixon and Arjen K. Lenstra}, editor = {Tor Helleseth}, title = {Factoring Integers Using {SIMD} Sieves}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {28--39}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_3}, doi = {10.1007/3-540-48285-7\_3}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DixonL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Domingo-Ferrer93, author = {Josep Domingo{-}Ferrer}, editor = {Tor Helleseth}, title = {Untransferable Rights in a Client-Independent Server Environment}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {260--266}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_22}, doi = {10.1007/3-540-48285-7\_22}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Domingo-Ferrer93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Ferguson93, author = {Niels Ferguson}, editor = {Tor Helleseth}, title = {Single Term Off-Line Coins}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {318--328}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_28}, doi = {10.1007/3-540-48285-7\_28}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Ferguson93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GamesR93, author = {Richard A. Games and Joseph J. Rushanan}, editor = {Tor Helleseth}, title = {Blind Synchronization of m-Sequnces with Even Span}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {168--180}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_15}, doi = {10.1007/3-540-48285-7\_15}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GamesR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GottfertN93, author = {Rainer G{\"{o}}ttfert and Harald Niederreiter}, editor = {Tor Helleseth}, title = {On the Linear Complexity of Products of Shift-Register Sequences}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {151--158}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_13}, doi = {10.1007/3-540-48285-7\_13}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GottfertN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HornauerSW93, author = {G. Hornauer and W. Stephan and Ralph Wernsdorf}, editor = {Tor Helleseth}, title = {Markov Ciphers and Alternating Groups}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {453--460}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_41}, doi = {10.1007/3-540-48285-7\_41}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HornauerSW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JohanssonKS93, author = {Thomas Johansson and Gregory Kabatianskii and Ben J. M. Smeets}, editor = {Tor Helleseth}, title = {On the Relation between A-Codes and Codes Correcting Independent Errors}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {1--11}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_1}, doi = {10.1007/3-540-48285-7\_1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JohanssonKS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaOSOT93, author = {Kaoru Kurosawa and Koji Okada and Keiichi Sakano and Wakaha Ogata and Shigeo Tsujii}, editor = {Tor Helleseth}, title = {Nonperfect Secret Sharing Schemes and Matroids}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {126--141}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_11}, doi = {10.1007/3-540-48285-7\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaOSOT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Matsui93, author = {Mitsuru Matsui}, editor = {Tor Helleseth}, title = {Linear Cryptanalysis Method for {DES} Cipher}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {386--397}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_33}, doi = {10.1007/3-540-48285-7\_33}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Matsui93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Meier93, author = {Willi Meier}, editor = {Tor Helleseth}, title = {On the Security of the {IDEA} Block Cipher}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {371--385}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_32}, doi = {10.1007/3-540-48285-7\_32}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Meier93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Naccache93, author = {David Naccache}, editor = {Tor Helleseth}, title = {Can {O.S.S.} be Repaired? Proposal for a New Practical Signature Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {233--239}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_19}, doi = {10.1007/3-540-48285-7\_19}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Naccache93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Nyberg93, author = {Kaisa Nyberg}, editor = {Tor Helleseth}, title = {Differentially Uniform Mappings for Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {55--64}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_6}, doi = {10.1007/3-540-48285-7\_6}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Nyberg93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OConnor93, author = {Luke O'Connor}, editor = {Tor Helleseth}, title = {On the Distribution of Characteristics in Bijective Mappings}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {360--370}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_31}, doi = {10.1007/3-540-48285-7\_31}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OConnor93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Oorschot93, author = {Paul C. van Oorschot}, editor = {Tor Helleseth}, title = {An Alternate Explanation of two BAN-logic "failures"}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {443--447}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_39}, doi = {10.1007/3-540-48285-7\_39}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Oorschot93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OstrovskyVY93, author = {Rafail Ostrovsky and Ramarathnam Venkatesan and Moti Yung}, editor = {Tor Helleseth}, title = {Interactive Hashing Simplifies Zero-Knowledge Protocol Design}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {267--273}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_23}, doi = {10.1007/3-540-48285-7\_23}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OstrovskyVY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ParkIK93, author = {Choonsik Park and Kazutomo Itoh and Kaoru Kurosawa}, editor = {Tor Helleseth}, title = {Efficient Anonymous Channel and All/Nothing Election Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {248--259}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_21}, doi = {10.1007/3-540-48285-7\_21}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ParkIK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ParkKOT93, author = {Choonsik Park and Kaoru Kurosawa and Tatsuaki Okamoto and Shigeo Tsujii}, editor = {Tor Helleseth}, title = {On Key Distribution and Authentication in Mobile Radio Networks}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {461--465}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_42}, doi = {10.1007/3-540-48285-7\_42}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ParkKOT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Patarin93, author = {Jacques Patarin}, editor = {Tor Helleseth}, title = {How to Find and Avoid Collisions for the Knapsack Hash Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {305--317}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_27}, doi = {10.1007/3-540-48285-7\_27}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Patarin93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Rooij93, author = {Peter de Rooij}, editor = {Tor Helleseth}, title = {On Schnorr's Preprocessing for Digital Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {435--439}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_37}, doi = {10.1007/3-540-48285-7\_37}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Rooij93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Safavi-NainiT93, author = {Reihaneh Safavi{-}Naini and Leonid M. Tombak}, editor = {Tor Helleseth}, title = {Optimal Authentication Systems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {12--27}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_2}, doi = {10.1007/3-540-48285-7\_2}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Safavi-NainiT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SeberryZZ93, author = {Jennifer Seberry and Xian{-}Mo Zhang and Yuliang Zheng}, editor = {Tor Helleseth}, title = {On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {181--199}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_16}, doi = {10.1007/3-540-48285-7\_16}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/SeberryZZ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Selmer93, author = {Ernst S. Selmer}, editor = {Tor Helleseth}, title = {From the Memoirs of a Norwegian Cryptologist}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {142--150}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_12}, doi = {10.1007/3-540-48285-7\_12}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Selmer93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Simmons93, author = {Gustavus J. Simmons}, editor = {Tor Helleseth}, title = {Subliminal Communication is Easy Using the {DSA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {218--232}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_18}, doi = {10.1007/3-540-48285-7\_18}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Simmons93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Simmons93a, author = {Gustavus J. Simmons}, editor = {Tor Helleseth}, title = {The Consequences of Trust in Shared Secret Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {448--452}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_40}, doi = {10.1007/3-540-48285-7\_40}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Simmons93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.