The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ASIACRYPT"( http://dblp.L3S.de/Venues/ASIACRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiacrypt

Publication years (Num. hits)
1990-1991 (47) 1993-1994 (37) 1995-1996 (36) 1998 (34) 1999 (33) 2000 (48) 2001 (35) 2002 (37) 2003 (34) 2004 (38) 2005 (38) 2006 (31) 2007 (36) 2008 (35) 2009 (42) 2010 (36) 2011 (41) 2012 (46) 2020 (1)
Publication types (Num. hits)
inproceedings(665) proceedings(20)
Venues (Conferences, Journals, ...)
ASIACRYPT(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 431 occurrences of 269 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Josef Pieprzyk, Reihaneh Safavi-Naini (eds.) Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Leonid M. Tombak Combinatorial Structure of A-codes with r-fold Security. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe On Sharing Many Secrets (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Wenbo Mao Design and Analysis of Key Exchange Protocols via Secure Channel Identification. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Gary Carter, Andrew J. Clark, Lauren Nielsen DESV-1: A Variation of the Data Encryption Standard (DES). Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui Linear Cryptanalysis of LOKI and s2DES. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Patrick Horster, Markus Michels, Holger Petersen 0002 Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Derek Atkins, Michael Graff, Arjen K. Lenstra, Paul C. Leyland The Magic Words are Squeamish Ossifrage. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Thomas Beth Multifeature Security through Homomorphic Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Yacov Yacobi Efficient Electronic Money (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Jacques Patarin Collisions and Inversions for Damgård's Whole Hash Function. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Chris Charnes, Josef Pieprzyk Attacking the SL2 Hashing Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Valtteri Niemi, Ari Renvall How to Prevent Buying of Votes in Computer Elections. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Eli Biham, Alex Biryukov How to Strengthen DES Using Existing Hardware. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Koji Okada, Kaoru Kurosawa Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Hideki Imai Information Security Aspects of Spread Spectrum Systems. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Spread Spectrum System, Information Security, CDMA, Jamming, Cellular System, Untraceability
1Mohssen Alabbadi, Stephen B. Wicker A Digital Signature Scheme Based on Linear Error-correcting Block Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Miodrag J. Mihaljevic A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Binary sequence generators, MacLaren-Marsaglia shuffler, Cryptanalysis, Distance measures, Correlation attack
1Catherine A. Meadows Formal Verification of Cryptographic Protocols: A Survey. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Hikaru Morita Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Tsutomu Matsumoto Incidence Structures for Key Sharing (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Key Sharing, Tactical Configuration, Tamper Resistant Module, Cryptography, Key Distribution, Identifier, Combinatorial Design, Binary Matrix
1Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng 0001 Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Xingong Chang, Zong-Duo Dai, Guang Gong Some Cryptographic Properties of Exponential Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF exponential permutation, nonlinearity, linear structure, SAC
1Amparo Fúster-Sabater, Pino Caballero-Gil On the Linear Complexity of Nonlinear Filtered PN-sequences. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Koji Okada, Keiichi Sakano Security of the Center in Key Distribution Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Koji Okada Combinatorial Interpretation of Secret Sharing Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Koji Okada, Shigeo Tsujii Low Exponent Attack against Elliptic Curve RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Donald Beaver Factoring: The DNA Solution. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Jacques Stern Can One Design a Signature Scheme Based on Error-Correctin Codes? Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Seongtaek Chee, Sangjin Lee, Kwangjo Kim Semi-bent Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano Zero-Knowledge Proofs of Computational Power in the Shared String Model. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Jovan Dj. Golic Intrinsic Statistical Weakness of Keystream Generators. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Philippe Béguin, Jean-Jacques Quisquater Secure Acceleration of DSS Signatures Using Insecure Server. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Peter Smith, Christopher Skinner A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Luke O'Connor, Jovan Dj. Golic A Unified Markow Approach to Differential and Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Eli Biham Cryptanalysis of Multiple Modes of Operation. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto (eds.) Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Hiroshi Miyano A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Wakaha Ogata, Kaoru Kurosawa On Claw Free Families. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Matthew Kwan Simultaneous Attacks in Differential Cryptanalysis (Getting More Pairs Per Encryption). Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya Any Language in IP Has a Divertable ZKIP. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Andrew Klapper, Mark Goresky Revealing Information with Partial Period Correlations (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Toshiya Itoh, Kouichi Sakurai On the Complexity of Constant Round ZKIP of Possession of Knowledge. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Marie-Jeanne Toussaint Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Chi-Sung Laih, Lein Harn Generalized Threshold Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Lein Harn, Hung-Yu Lin On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Kazuo Ohta, Tatsuaki Okamoto A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Jun-ichi Mizusawa IC-Cards and Telecommunication Services. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Shimon Even, Yishay Mansour A Construction of a Cioher From a Single Pseudorandom Permutation. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Mike Burmester An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai 4 Move Perfect ZKIP of Knowledge with No Assumption. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Ronald L. Rivest Cryptography and Machine Learning. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Babak Sadeghiyan, Josef Pieprzyk On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai A Multi-Purpose Proof System - for Identity and Membership Proofs. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Kwangjo Kim Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Atsuko Miyaji On Ordinary Elliptic Curve Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Lars R. Knudsen Cryptanalysis of LOKI. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Toshinobu Kaneko A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Joan Daemen Limitations of the Even-Mansour Construction. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Chi-Sung Laih, Sung-Ming Yen, Lein Harn Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Stig Fr. Mjølsnes Privacy, Cryptographic Pseudonyms, and The State of Health. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Joan Daemen, Antoon Bosselaers, René Govaerts, Joos Vandewalle Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Antoine Joux, Jacques Stern Cryptanalysis of Another Knapsack Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto An Extensin of Zero-Knowledge Proofs and Its Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Matthew Kwan, Josef Pieprzyk A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Yuliang Zheng 0001, Thomas Hardjono, Josef Pieprzyk Sibling Intractable Function Families and Their Applications (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Donald W. Davies The Transition from Mechanisms to Electronic Computers, 1940 to 1950. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini Feistel Type Authentication Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Hung-Yu Lin, Lein Harn A Generalized Secret Sharing Scheme With Cheater Detection. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Joost Meijers, Johan van Tilburg Extended Majority Voting and Private-Key Algebraic-Code Encryptions. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Joan Feigenbaum, Rafail Ostrovsky A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Lance Fortnow, Mario Szegedy On the Power of Two-Local Random Reductions. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Jun-Hui Yang, Zong-Duo Dai, Kencheng Zeng The Data Base of Selected Permutations (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF Permutations, DES, S-boxes
1Jørgen Brandt, Ivan Damgård, Peter Landrock Speeding up Prime Number Generation. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, Babak Sadeghiyan Optima Perfect Randomizers. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Babak Sadeghiyan, Yuliang Zheng 0001, Josef Pieprzyk How to Construct A Family of Strong One Way Permutations. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Joan Daemen, René Govaerts, Joos Vandewalle A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Bruce Goldburg, Ed Dawson, S. Sridharan A Secure Analog Speech Scrambler Using the Discrete Cosine Transform. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi Results of Switching-Closure-Test on FEAL (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Atsushi Shimbo, Shin-ichi Kawamura Cryptanalysis of Several Conference Key Distribution Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Man Y. Rhee Research Activities on Cryptology in Korea. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Ronald L. Rivest On NIST's Proposed Digital Signature Standard. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Jennifer Seberry, Josef Pieprzyk (eds.) Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #685 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license