- 1988
- Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone:
An Interactive Data Exchange Protocol Based on Discrete Exponentiation. EUROCRYPT 1988: 159-166 - Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone:
Fast Exponentiation in GF(2n). EUROCRYPT 1988: 251-255 - Thomas Beth:
Efficient Zero-Knowledge Identification Scheme for Smart Cards. EUROCRYPT 1988: 77-84 - Bert den Boer:
Cryptanalysis of F.E.A.L. EUROCRYPT 1988: 293-299 - Colin Boyd:
Some Applications of Multiple Key Ciphers. EUROCRYPT 1988: 455-467 - Jørgen Brandt, Ivan Damgård, Peter Landrock:
Anonymous and Verifiable Registration in Databases. EUROCRYPT 1988: 167-176 - Ernest F. Brickell, Douglas R. Stinson:
Authentication Codes with Multiple Arbiters (Extended Abstract). EUROCRYPT 1988: 51-55 - William G. Chambers, Dieter Gollmann:
Lock-In Effect in Cascades of Clock-Controlled Shift-Registers. EUROCRYPT 1988: 331-343 - David Chaum:
Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. EUROCRYPT 1988: 177-182 - George I. Davida, Yvo Desmedt:
Passports and Visas Versus IDS (Extended Abstract). EUROCRYPT 1988: 183-188 - James A. Davis, Diane B. Holdridge:
Factorization of Large Integers on a Massively Parallel Computer. EUROCRYPT 1988: 235-243 - Yvo Desmedt:
Subliminal-Free Authentication and Signature (Extended Abstract). EUROCRYPT 1988: 23-33 - Cunsheng Ding:
Proof of Massey's Conjectured Algorithm. EUROCRYPT 1988: 345-349 - Marc Girault, Robert Cohen, Mireille Campana:
A Generalized Birthday Attack. EUROCRYPT 1988: 129-156 - Brigitte Vallée, Marc Girault, Philippe Toffin:
How to Break Okamoto's Cryptosystem by Reducing Lattice Bases. EUROCRYPT 1988: 281-291 - Philippe Godlewski, Paul Camion:
Manipulations and Errors, Detection and Localization. EUROCRYPT 1988: 97-106 - Raouf N. Gorgui-Naguib, Satnam Singh Dlay:
Properties of the Euler Totient Function Modulo 24 and Some of its Cryptographic Implications. EUROCRYPT 1988: 267-274 - Louis C. Guillou, Jean-Jacques Quisquater:
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. EUROCRYPT 1988: 123-128 - Christoph G. Günther:
A Universal Algorithm for Homophonic Coding. EUROCRYPT 1988: 405-414 - Frank Hoornaert, Marc Decroos, Joos Vandewalle, René Govaerts:
Fast RSA-Hardware: Dream or Reality? EUROCRYPT 1988: 257-264 - He Jingmin, Lu Kaicheng:
A New Probabilistic Encryption Scheme. EUROCRYPT 1988: 415-418 - Shin-ichi Kawamura, Kyoko Hirano:
A Fast Modular Arithmetic Algorithm Using a Residue Table (Extended Abstract). EUROCRYPT 1988: 245-250 - Svein J. Knapskog:
Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity. EUROCRYPT 1988: 107-122 - Hans-Joachim Knobloch:
A Smart Card Implementation of the Fiat-Shamir Identification Scheme. EUROCRYPT 1988: 87-95 - Kenji Koyama, Kazuo Ohta:
Security of Improved Identity-Based Conference Key Distribution Systems. EUROCRYPT 1988: 11-19 - Pil Joong Lee, Ernest F. Brickell:
An Observation on the Security of McEliece's Public-Key Cryptosystem. EUROCRYPT 1988: 275-280 - Dongdai Lin, Mulan Liu:
Linear Recurring m-Arrays. EUROCRYPT 1988: 351-357 - Tsutomu Matsumoto, Hideki Imai:
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption. EUROCRYPT 1988: 419-453 - Willi Meier, Othmar Staffelbach:
Fast Correlation Attacks on Stream Ciphers (Extended Abstract). EUROCRYPT 1988: 301-314 - Harald Niederreiter:
The Probabilistic Theory of Linear Complexity. EUROCRYPT 1988: 191-209