The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1993 (conf/crypto/1993)

  1. Adi Shamir
    Efficient Signature Schemes Based on Birational Permutations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:1-12 [Conf]
  2. Jacques Stern
    A New Identification Scheme Based on Syndrome Decoding. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:13-21 [Conf]
  3. Don Coppersmith, Hugo Krawczyk, Yishay Mansour
    The Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:22-39 [Conf]
  4. Richard Taylor
    An Integrity Check Value Algorithm for Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:40-48 [Conf]
  5. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:49-60 [Conf]
  6. Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii
    A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:61-72 [Conf]
  7. Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano
    Secret Sharing and Perfect Zero Knowledge. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:73-84 [Conf]
  8. Yonatan Aumann, Uriel Feige
    On Message Proof Systems with Known Space Verifiers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:85-99 [Conf]
  9. Ivan Damgård
    Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:100-109 [Conf]
  10. Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro
    Fully Dynamic Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:110-125 [Conf]
  11. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:126-135 [Conf]
  12. Hugo Krawczyk
    Secret Sharing Made Short. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:136-146 [Conf]
  13. Leonard M. Adleman, Jonathan DeMarrais
    A Subexponential Algorithm for Discrete Logarithms over All Finite Fields. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:147-158 [Conf]
  14. Johannes Buchmann, J. Loho, J. Zayer
    An Implementation of the General Number Field Sieve. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:159-165 [Conf]
  15. Thomas F. Denny, Bruce Dodson, Arjen K. Lenstra, Mark S. Manasse
    On the Factorization of RSA-120. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:166-174 [Conf]
  16. Antoon Bosselaers, René Govaerts, Joos Vandewalle
    Comparison of Three Modular Reduction Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:175-186 [Conf]
  17. Ishai Ben-Aroya, Eli Biham
    Differtial Cryptanalysis of Lucifer. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:187-199 [Conf]
  18. Kazuo Ohta, Mitsuru Matsui
    Differential Attack on Message Authentication Codes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:200-211 [Conf]
  19. Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens
    Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:212-223 [Conf]
  20. Joan Daemen, René Govaerts, Joos Vandewalle
    Weak Keys for IDEA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:224-231 [Conf]
  21. Mihir Bellare, Phillip Rogaway
    Entity Authentication and Key Distribution. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:232-249 [Conf]
  22. Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann
    On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:250-265 [Conf]
  23. Matthew K. Franklin, Stuart Haber
    Joint Encryption and Message-Efficient Secure Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:266-277 [Conf]
  24. Avrim Blum, Merrick L. Furst, Michael J. Kearns, Richard J. Lipton
    Cryptographic Primitives Based on Hard Learning Problems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:278-291 [Conf]
  25. Niels Ferguson
    Extensions of Single-term Coins. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:292-301 [Conf]
  26. Stefan Brands
    Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1993, pp:302-318 [Conf]
  27. Claude Crépeau, Joe Kilian
    Discreet Solitary Games. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:319-330 [Conf]
  28. Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets
    On Families of Hash Functions via Geometric Codes and Concatenation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:331-342 [Conf]
  29. Thomas Johansson
    On the Construction of Perfect Authentication Codes that Permit Arbitration. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:343-354 [Conf]
  30. Peter Gemmell, Moni Naor
    Codes for Interactive Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:355-367 [Conf]
  31. Bart Preneel, René Govaerts, Joos Vandewalle
    Hash Functions Based on Block Ciphers: A Synthetic Approach. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:368-378 [Conf]
  32. Walter Hohl, Xuejia Lai, Thomas Meier, Christian Waldvogel
    Security of Iterated Hash Functions Based on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:379-390 [Conf]
  33. Jacques Patarin, Pascal Chauvaud
    Improved Algorithms for the Permuted Kernel Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:391-402 [Conf]
  34. Luke O'Connor
    On the Distribution of Characteristics in Composite Permutations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:403-412 [Conf]
  35. Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
    Remark on the Threshold RSA Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:413-420 [Conf]
  36. Chae Hoon Lim, Pil Joong Lee
    Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:420-434 [Conf]
  37. Don Coppersmith, Jacques Stern, Serge Vaudenay
    Attacks on the Birational Permutation Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:435-443 [Conf]
  38. Amos Beimel, Benny Chor
    Interaction in Key Distribution Schemes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:444-455 [Conf]
  39. Frank Thomson Leighton, Silvio Micali
    Secret-Key Agreement without Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:456-479 [Conf]
  40. Amos Fiat, Moni Naor
    Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:480-491 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002