The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "AUSCRYPT"( http://dblp.L3S.de/Venues/AUSCRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiacrypt

Publication years (Num. hits)
1990 (39) 1992 (46) 1993 (1)
Publication types (Num. hits)
inproceedings(85) proceedings(1)
Venues (Conferences, Journals, ...)
AUSCRYPT(86)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5 occurrences of 5 keywords

Results
Found 86 publication records. Showing 86 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jennifer Seberry, Yuliang Zheng 0001 (eds.) Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings Search on Bibsonomy AUSCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Chi-Sung Laih, Sung-Ming Yen Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Jennifer Seberry Practical Proven Secure Authentication with Arbitration. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Manuel Cerecedo, Tsutomu Matsumoto, Hideki Imai Non-Interactive Generation of Shared Pseudorandom Sequences. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Michael Portz A Generalized Description of DES-based and Benes-based Permutationgenerators. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Rudolf Lidl, Winfried B. Müller Primality Testing with Lucas Functions. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Benjamin B. Nieh, Stafford E. Tavares Modelling and Analyzing Cryprographic Protocols Using Petri Nets. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1John Detombe, Stafford E. Tavares Constructing Large Cryptographically Strong S-boxes. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Xuejia Lai, Rainer A. Rueppel, Jack Woollven A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Kouichi Sakurai, Toshiya Itoh Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Miodrag J. Mihaljevic An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Jörg Sauerbrey A Modular Exponentiation Unit Based on Systolic Arrays. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Jennifer Seberry, Xian-Mo Zhang Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta A Practical Secret Voting Scheme for Large Scale Elections. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Chae Hoon Lim, Pil Joong Lee Modified Maurer-Yacobi's scheme and its applications. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Christian Waldvogel, James L. Massey The Probability Distribution of the Diffie-Hellman Key. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Chris Charnes, Josef Pieprzyk Linear Nonequivalence versus Nonlinearity. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Bart Preneel, René Govaerts, Joos Vandewalle An Attack on Two Hash Functions by Zheng-Matsumoto-Imai. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Yuliang Zheng 0001, Josef Pieprzyk, Jennifer Seberry HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Jean Claude Paillès New Protocols for Electronic Money. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Alain P. Hiltgen Constructions of Freebly-One-Way Families of Permutations. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Christine M. O'Keefe A Comparison of Key Distribution Patterns Constructed from Circle Geometries. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Edward Zuk Remarks on "The Design of a Conference Key Distribution System". Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Sung-Ming Yen, Chi-Sung Laih The Fast Cascade Exponentation Algorithm and its Applications on Cryptography. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Ed Dawson Cryptanalysis of Summation Generator. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Lein Harn, Shoubao Yang Public-Key Cryptosystem Based on the Discrete Logarithm Problem. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Valery I. Korzhik, Viktor Yakovlev Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk). Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Wen-Ai Jackson, Keith M. Martin Cumulative Arrays and Geometric Secret Sharing Schemes. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Atsuko Miyaji Elliptic Curves over Fp Suitable for Cryptosystems. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Mike Rezny, Eddie Trimarchi A Block Cipher Method using Combinations of Different Methods under the Control of the User Key. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Bart Preneel, René Govaerts, Joos Vandewalle On the Power of Memory in the Design of Collision Resistant Hash Functions. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Takashi Satoh, Kaoru Kurosawa, Shigeo Tsujii Privacy for Multi-Party Protocols. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen On Verifiable Implicit Asking Protocols for RSA Computation. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Leisa Condie Prime Generation with the Demytko-Miller-Trbuvich Algorithm. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Lein Harn, Shoubao Yang Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Andrew Klapper The Vulnerability of Geometric Sequences Based on Fields on Odd Characteristic. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Leonid M. Tombak, Reihaneh Safavi-Naini Authentication Codes with Perfect Protection. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Jun-Hui Yang, Zong-Duo Dai Construction of m-ary de Bruijn Sequences (Extendet abstract). Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Kouichi Sakurai, Toshiya Itoh On Bit Correlations Among Preimages of "Many to One" One-Way Functions. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt Treshold Cryptosystems (invited talk). Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii Nonperfect Secret Sharing Schemes. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Lars R. Knudsen Cryptanalysis of LOKI91. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1John Snare Information Technology Security Standards - An Australian Perspective. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Leonid M. Tombak Authentication Codes under Impersonation Attack. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Thomas Hardjono, Yuliang Zheng 0001 A Practical Digital Multisignature Scheme Based on Discrete Logarithms. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Chin-Chen Chang 0001, Tzong-Chen Wu, C. P. Chen The Design of a Conference Key Distribution System. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Michael Bertilsson, Ingemar Ingemarsson A Construction of Practical Secret Sharing Schemes using Linear Block Codes. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Hiroki Shizuya, Kenji Koyama, Toshiya Itoh Demonstrating Possession without Revealing Factors and its Application. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Zong-Duo Dai, Kencheng Zeng Continued Fractions and the Berlekamp-Massey Algorithm. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Mark Ames Secure Cryptographic Initialisation. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Lawrence Brown, Jennifer Seberry Key Scheduling In Des Type Cryptosystems. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Yixian Yang Dyadic Matrices and Their Potential Significance in Cryptography. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Svein J. Knapskog Formal Specification and Verification of Secure Communication Protocols. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Marc Girault A (non-practical) three-pass identification protocol using coding theory. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Yixian Yang K-M Sequence is Forwardly Predictable. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Jan C. A. van der Lubbe, Dick E. Boekee KEYMEX: An expert system for the design of key management schemes. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Michael Newberry Minòs: Extended User Authentication. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Willi Geiselmann, Dieter Gollmann VLSI Design for Exponentiation in GF (2n). Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Kazuo Ohta, Kenji Koyama Meet-in-the-Middle Attack on Digital Signature Schemes. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Authentication, Digital signature, Hash function, One-way function, Meet-in-the-middle attack
1Hikaru Morita A Fast Modular-multiplication Module for Smart Cards. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1David Chaum Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Pil Joong Lee Secure User Access Control for Public Networks. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Kencheng Zeng, Minqiang Huang Solving Equations in Sequences. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Vangalur S. Alagar Range Equations and Range Matrices: a Study in Statistical Database Security. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Guang Gong Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Ronald Ferreira The Practical Application Of State Of The Art Security In Real Environments. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1John M. Carroll 0002 The Three Faces of Information Security. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Ed Dawson, Bruce Goldburg Universal Logic Sequences. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Klaus Gaarder, Einar Snekkenes On The Formal Analysis of PKCS Authentication Protocols. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Thomas Hardjono Record Encryption in Distributed Databases. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF CR Categories E.3, H.2.0, H.3
1Miodrag J. Mihaljevic, Jovan Dj. Golic A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Cees J. A. Jansen, Dick E. Boekee A Binary Sequence Generator Based on Ziv-Lempel Source Coding. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Rodney H. Cooper, Wayne Patterson RSA as a Benchmark for Multiprocessor Machines. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao Large Primes in Stream Cipher Cryptography. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Lawrence Brown, Josef Pieprzyk, Jennifer Seberry LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini Parallel Generation of Pseudo-Random Sequences. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Barry Hayes Anonymous One-Time Signatures and Flexible Untraceable Electronic Cash. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, Xian-Mo Zhang Permutation Generators of Alternating Groups. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Rudolf Lidl, Winfried B. Müller A Note on Strong Fibonacci Pseudoprimes. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan Network Security Policy Models. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Helen Gustafson, Ed Dawson, William J. Caelli Comparison of Block Ciphers. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Cunsheng Ding Lower Bounds on the Weight Complexities of Cascaded Binary Sequences. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Alfred Menezes, Scott A. Vanstone The Implementation of Elliptic Curve Cryptosystems. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Kenji Koyama Direct Demonstration of the Power to Break Public-Key Cryptosystems. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild Some Remarks on Authentication Systems. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Cees J. A. Jansen, Dick E. Boekee On the Significance of the Directed Acyclic Word Graph in Cryptology. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #86 of 86 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license