Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Josef Pieprzyk, Reihaneh Safavi-Naini (eds.) |
Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings |
ASIACRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini, Leonid M. Tombak |
Combinatorial Structure of A-codes with r-fold Security. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
On Sharing Many Secrets (Extended Abstract). |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Wenbo Mao |
Design and Analysis of Key Exchange Protocols via Secure Channel Identification. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Gary Carter, Andrew J. Clark, Lauren Nielsen |
DESV-1: A Variation of the Data Encryption Standard (DES). |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui |
Linear Cryptanalysis of LOKI and s2DES. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Horster, Markus Michels, Holger Petersen 0002 |
Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Derek Atkins, Michael Graff, Arjen K. Lenstra, Paul C. Leyland |
The Magic Words are Squeamish Ossifrage. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Beth |
Multifeature Security through Homomorphic Encryption. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Yacov Yacobi |
Efficient Electronic Money (Extended Abstract). |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Patarin |
Collisions and Inversions for Damgård's Whole Hash Function. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Chris Charnes, Josef Pieprzyk |
Attacking the SL2 Hashing Scheme. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Valtteri Niemi, Ari Renvall |
How to Prevent Buying of Votes in Computer Elections. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester |
Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Eli Biham, Alex Biryukov |
How to Strengthen DES Using Existing Hardware. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Koji Okada, Kaoru Kurosawa |
Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Hideki Imai |
Information Security Aspects of Spread Spectrum Systems. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
Spread Spectrum System, Information Security, CDMA, Jamming, Cellular System, Untraceability |
1 | Mohssen Alabbadi, Stephen B. Wicker |
A Digital Signature Scheme Based on Linear Error-correcting Block Codes. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Miodrag J. Mihaljevic |
A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
Binary sequence generators, MacLaren-Marsaglia shuffler, Cryptanalysis, Distance measures, Correlation attack |
1 | Catherine A. Meadows |
Formal Verification of Cryptographic Protocols: A Survey. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Hikaru Morita |
Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Tsutomu Matsumoto |
Incidence Structures for Key Sharing (Extended Abstract). |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
Key Sharing, Tactical Configuration, Tamper Resistant Module, Cryptography, Key Distribution, Identifier, Combinatorial Design, Binary Matrix |
1 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng 0001 |
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Xingong Chang, Zong-Duo Dai, Guang Gong |
Some Cryptographic Properties of Exponential Functions. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
exponential permutation, nonlinearity, linear structure, SAC |
1 | Amparo Fúster-Sabater, Pino Caballero-Gil |
On the Linear Complexity of Nonlinear Filtered PN-sequences. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Koji Okada, Keiichi Sakano |
Security of the Center in Key Distribution Schemes. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Koji Okada |
Combinatorial Interpretation of Secret Sharing Schemes. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Koji Okada, Shigeo Tsujii |
Low Exponent Attack against Elliptic Curve RSA. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Donald Beaver |
Factoring: The DNA Solution. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Stern |
Can One Design a Signature Scheme Based on Error-Correctin Codes? |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Seongtaek Chee, Sangjin Lee, Kwangjo Kim |
Semi-bent Functions. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano |
Zero-Knowledge Proofs of Computational Power in the Shared String Model. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jovan Dj. Golic |
Intrinsic Statistical Weakness of Keystream Generators. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Philippe Béguin, Jean-Jacques Quisquater |
Secure Acceleration of DSS Signatures Using Insecure Server. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Peter Smith, Christopher Skinner |
A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Luke O'Connor, Jovan Dj. Golic |
A Unified Markow Approach to Differential and Linear Cryptanalysis. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Eli Biham |
Cryptanalysis of Multiple Modes of Operation. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto (eds.) |
Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings |
ASIACRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Miyano |
A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Wakaha Ogata, Kaoru Kurosawa |
On Claw Free Families. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Kwan |
Simultaneous Attacks in Differential Cryptanalysis (Getting More Pairs Per Encryption). |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya |
Any Language in IP Has a Divertable ZKIP. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Klapper, Mark Goresky |
Revealing Information with Partial Period Correlations (Extended Abstract). |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Toshiya Itoh, Kouichi Sakurai |
On the Complexity of Constant Round ZKIP of Possession of Knowledge. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Marie-Jeanne Toussaint |
Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract). |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Sung Laih, Lein Harn |
Generalized Threshold Cryptosystems. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Lein Harn, Hung-Yu Lin |
On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Kazuo Ohta, Tatsuaki Okamoto |
A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jun-ichi Mizusawa |
IC-Cards and Telecommunication Services. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Shimon Even, Yishay Mansour |
A Construction of a Cioher From a Single Pseudorandom Permutation. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Mike Burmester |
An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai |
4 Move Perfect ZKIP of Knowledge with No Assumption. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Ronald L. Rivest |
Cryptography and Machine Learning. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Babak Sadeghiyan, Josef Pieprzyk |
On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai |
A Multi-Purpose Proof System - for Identity and Membership Proofs. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Kwangjo Kim |
Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Atsuko Miyaji |
On Ordinary Elliptic Curve Cryptosystems. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Lars R. Knudsen |
Cryptanalysis of LOKI. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Toshinobu Kaneko |
A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Joan Daemen |
Limitations of the Even-Mansour Construction. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry |
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Sung Laih, Sung-Ming Yen, Lein Harn |
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Stig Fr. Mjølsnes |
Privacy, Cryptographic Pseudonyms, and The State of Health. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Joan Daemen, Antoon Bosselaers, René Govaerts, Joos Vandewalle |
Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Antoine Joux, Jacques Stern |
Cryptanalysis of Another Knapsack Cryptosystem. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto |
An Extensin of Zero-Knowledge Proofs and Its Applications. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Kwan, Josef Pieprzyk |
A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract). |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Yuliang Zheng 0001, Thomas Hardjono, Josef Pieprzyk |
Sibling Intractable Function Families and Their Applications (Extended Abstract). |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Donald W. Davies |
The Transition from Mechanisms to Electronic Computers, 1940 to 1950. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini |
Feistel Type Authentication Codes. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Hung-Yu Lin, Lein Harn |
A Generalized Secret Sharing Scheme With Cheater Detection. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Joost Meijers, Johan van Tilburg |
Extended Majority Voting and Private-Key Algebraic-Code Encryptions. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Joan Feigenbaum, Rafail Ostrovsky |
A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Lance Fortnow, Mario Szegedy |
On the Power of Two-Local Random Reductions. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jun-Hui Yang, Zong-Duo Dai, Kencheng Zeng |
The Data Base of Selected Permutations (Extended Abstract). |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
Permutations, DES, S-boxes |
1 | Jørgen Brandt, Ivan Damgård, Peter Landrock |
Speeding up Prime Number Generation. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, Babak Sadeghiyan |
Optima Perfect Randomizers. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Babak Sadeghiyan, Yuliang Zheng 0001, Josef Pieprzyk |
How to Construct A Family of Strong One Way Permutations. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Joan Daemen, René Govaerts, Joos Vandewalle |
A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Bruce Goldburg, Ed Dawson, S. Sridharan |
A Secure Analog Speech Scrambler Using the Discrete Cosine Transform. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi |
Results of Switching-Closure-Test on FEAL (Extended Abstract). |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Shimbo, Shin-ichi Kawamura |
Cryptanalysis of Several Conference Key Distribution Schemes. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Man Y. Rhee |
Research Activities on Cryptology in Korea. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Ronald L. Rivest |
On NIST's Proposed Digital Signature Standard. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer Seberry, Josef Pieprzyk (eds.) |
Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings |
ASIACRYPT |
1990 |
DBLP DOI BibTeX RDF |
|