Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ran Canetti |
Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Ari Juels, Michael Luby, Rafail Ostrovsky |
Security of Blind Digital Signatures (Extended Abstract). |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Jerome A. Solinas |
An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
public-key cryptography, elliptic curves, exponentiation |
1 | Eli Biham, Adi Shamir |
Differential Fault Analysis of Secret Key Cryptosystems. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky |
Deniable Encryption. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Jean-François Misarsky |
A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Multiplicative attack, redundancy, RSA, LLL algorithm |
1 | Jan Camenisch, Markus Stadler |
Efficient Group Signature Schemes for Large Groups (Extended Abstract). |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Matthew K. Franklin |
Efficient Generation of Shared RSA Keys (Extended Abstract). |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
RSA, Threshold Cryptography, Multiparty computation, Primality testing |
1 | Serge Vaudenay |
Hidden Collisions on DSS. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Tor Helleseth, Thomas Johansson 0001 |
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
exponential sums, Galois rings, authentication codes, Universal hash functions |
1 | James L. Massey, Shirlei Serconek |
Linear Complexity of Periodic Sequences: A General Theory. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Games-Chan algorithm, Hadamard product, Hasse derivative, hyperderivative, stream ciphers, Discrete Fourier transform, DFT, linear complexity |
1 | Mihir Bellare, Ran Canetti, Hugo Krawczyk |
Keying Hash Functions for Message Authentication. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Robust and Efficient Sharing of RSA Functions. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Ramarathnam Venkatesan |
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Claus-Peter Schnorr |
Security of 2^t-Root Identification and Signatures. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Fiat-Shamir scheme, active/passive impersonation attacks, adaptive chosen-message attack, factoring of integers, Identification, signature, random oracle model |
1 | Ronald Cramer, Ivan Damgård |
New Generation of Secure and Practical RSA-Based Signatures. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | John Kelsey, Bruce Schneier, David A. Wagner 0001 |
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Richard J. Lipton |
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Antoon Bosselaers, René Govaerts, Joos Vandewalle |
Fast Hashing on the Pentium. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Pentium processor, Parallel implementation, Software performance, Cryptographic hash functions |
1 | Joe Kilian, Phillip Rogaway |
How to Protect DES Against Exhaustive Key Search. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Droste |
New Results on Visual Cryptography. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Secret Sharing Problem, Secret Sharing Scheme, Visual Cryptography |
1 | Paul Camion, Anne Canteaut |
Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Correlation-immune functions, cryptanalysis, stream ciphers, hash functions, orthogonal arrays |
1 | Mats Näslund |
All Bits ax+b mod p are Hard (Extended Abstract). |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Daniel R. Simon |
Anonymous Communication and Anonymous Cash. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
anonymous communication, Electronic cash |
1 | Mustafa Atici, Douglas R. Stinson |
Universal Hashing and Multiple Authentication. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
universal hashing, Authentication code |
1 | Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson |
Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Shai Halevi, Silvio Micali |
Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Susan K. Langford |
Weakness in Some Threshold Cryptosystems. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signatures, secret sharing, undeniable signatures, threshold signatures, Threshold Cryptosystems |
1 | Neal Koblitz (eds.) |
Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Dominic Mayers |
Quantum Key Distribution and String Oblivious Transfer in Noisy Channels. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Markus Jakobsson, Moti Yung |
Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Richard J. Hughes, Gabriel G. Luther, George L. Morgan, Charles G. Peterson, Charles M. Simmons |
Quantum Cryptography over Underground Optical Fibers. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Paul C. Kocher |
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
cryptanalysis, DSS, RSA, Timing attack, Diffie-Hellman |
1 | Jacques Patarin |
Asymmetric Cryptography with a Hidden Monomial. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer, Stefan Wolf 0001 |
Diffie-Hellman Oracles. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Diffie-Hellman protocol, Public-key cryptography, Elliptic curves, Discrete logarithms |
1 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
1 | Victor Shoup |
On Fast and Provably Secure Message Authentication Based on Universal Hashing. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Paul C. van Oorschot, Michael J. Wiener |
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
parallel collision search, low Hamming weight exponents, cryptanalysis, DES, Meet-in-the-middle attack |
1 | Lars R. Knudsen, Willi Meier |
Improved Differential Attacks on RC5. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Differential cryptanalysis, Weak keys |
1 | Amos Beimel, Benny Chor |
Secret Sharing with Public Reconstruction (Extended Abstract). |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra |
Some Remarks on Lucas-Based Cryptosystems. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Klapper, Mark Goresky |
Cryptanalysis Based on 2-Adic Rational Approximation. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
cryptanalysis, Binary sequences, rational approximation, feedback with carry shift registers, 2-adic numbers |
1 | Susan K. Langford |
Threshold DSS Signatures without a Trusted Party. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Yair Frankel, Moti Yung |
Escrow Encryption Systems Visited: Attacks, Analysis and Designs. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung |
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Sangjoon Park, Sangjin Lee, Seung-Cheol Goh |
On the Security of the Gollmann Cascades. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Don Coppersmith (eds.) |
Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | G. R. Blakley, Gregory Kabatianskii |
General Perfect Secret Sharing Schemes. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Roch Guérin, Phillip Rogaway |
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Yair Frankel, Moti Yung |
Cryptanalysis of the Immunized LL Public Key Systems. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata |
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Chae Hoon Lim, Pil Joong Lee |
Security and Performance of Server-Aided RSA Computation Protocols. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Oded Goldreich 0001, Tatsuaki Okamoto, Avi Wigderson |
Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Ross J. Anderson, Roger M. Needham |
Robustness Principles for Public Key Protocols. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Richard J. Lipton |
Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Claude Crépeau, Jeroen van de Graaf, Alain Tapp |
Committed Oblivious Transfer and Private Multi-Party Computation. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Dominic Mayers |
On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Joe Kilian |
Improved Efficient Arguments (Preliminary Version). |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Bruce Dodson, Arjen K. Lenstra |
NFS with Four Large Primes: An Explosive Experiment. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Philippe Béguin, Jean-Jacques Quisquater |
Fast Server-Aided RSA Signatures Secure Against Active Attacks. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto |
An Efficient Divisible Electronic Cash Scheme. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Lars R. Knudsen |
A Key-schedule Weakness in SAFER K-64. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Joe Kilian, Frank Thomson Leighton |
Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract). |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel, Paul C. van Oorschot |
MDx-MAC and Building Fast MACs from Hash Functions. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Donald Beaver |
Precomputing Oblivious Transfer. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Cramer, Ivan Damgård |
Secure Signature Schemes based on Interactive Protocols. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Micali, Ray Sidney |
A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Richard Schroeppel, Hilarie K. Orman, Sean W. O'Malley, Oliver Spatscheck |
Fast Key Exchange with Elliptic Curve Systems. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Patarin |
Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, James Shaw |
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Thorsten Theobald |
How to Break Shamir's Asymmetric Basis. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Burton S. Kaliski Jr., Yiqun Lisa Yin |
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Shai Halevi |
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Phillip Rogaway |
Bucket Hashing and its Application to Fast Message Authentication. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Arjen K. Lenstra, Peter Winkler 0001, Yacov Yacobi |
A Key Escrow System with Warrant Bounds. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Kazuo Ohta, Shiho Moriai, Kazumaro Aoki |
Improving the Search Algorithm for the Best Linear Expression. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
1 | Susan K. Langford, Martin E. Hellman |
Differential-Linear Cryptanalysis. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Bleichenbacher, Ueli M. Maurer |
Directed Acyclic Graphs, One-way Functions and Digital Signatures. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Preda Mihailescu |
Fast Generation of Provable Primes Using Search in Arithmetic Progressions. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Eyal Kushilevitz, Adi Rosén |
A Randomnesss-Rounds Tradeoff in Private Computation. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Douglas R. Stinson (eds.) |
Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Kazuo Ohta, Kazumaro Aoki |
Linear Cryptanalysis of the Fast Data Encipherment Algorithm. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro |
Multi-Secret Sharing Schemes. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ingrid Biehl, Johannes A. Buchmann, Christoph Thiel |
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer |
Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jinhui Chao, Kazuo Tanada, Shigeo Tsujii |
Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Don Davis, Ross Ihaka, Philip Fenstermacher |
Cryptographic Randomness from Air Turbulence in Disk Drives. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Chae Hoon Lim, Pil Joong Lee |
More Flexible Exponentiation with Precomputation. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Tamás Horváth 0002, Spyros S. Magliveras, Tran van Trung |
A Parallel Permutation Multiplier for a PGM Crypto-chip. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Mike Burmester |
On the Risk of Opening Distributed Keys. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Pierre Tillich, Gilles Zémor |
Hashing with SL_2. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Krawczyk |
LFSR-based Hashing and Authentication. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Kazue Sako, Joe Kilian |
Secure Voting Using Partially Compatible Homomorphisms. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto |
Designated Confirmer Signatures and Public-Key Encryption are Equivalent. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Beth, Dejan E. Lazic, A. Mathias |
Cryptanalysis of Cryptosystems Based on Remote Chaos Replication. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Christian Gehrmann |
Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng 0001 |
Pitfalls in Designing Substitution Boxes (Extended Abstract). |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Benny Chor, Amos Fiat, Moni Naor |
Tracing Traitors. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Joe Kilian, Phillip Rogaway |
The Security of Cipher Block Chaining. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Marc Girault, Jacques Stern |
On the Length of Cryptographic Hash-Values Used in Identification Schemes. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|