Conferences in DBLP
Adi Shamir Efficient Signature Schemes Based on Birational Permutations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:1-12 [Conf ] Jacques Stern A New Identification Scheme Based on Syndrome Decoding. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:13-21 [Conf ] Don Coppersmith , Hugo Krawczyk , Yishay Mansour The Shrinking Generator. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:22-39 [Conf ] Richard Taylor An Integrity Check Value Algorithm for Stream Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:40-48 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:49-60 [Conf ] Toshiya Itoh , Masafumi Hoshi , Shigeo Tsujii A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:61-72 [Conf ] Alfredo De Santis , Giovanni Di Crescenzo , Giuseppe Persiano Secret Sharing and Perfect Zero Knowledge. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:73-84 [Conf ] Yonatan Aumann , Uriel Feige On Message Proof Systems with Known Space Verifiers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:85-99 [Conf ] Ivan Damgård Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:100-109 [Conf ] Carlo Blundo , Antonella Cresti , Alfredo De Santis , Ugo Vaccaro Fully Dynamic Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:110-125 [Conf ] Wen-Ai Jackson , Keith M. Martin , Christine M. O'Keefe Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:126-135 [Conf ] Hugo Krawczyk Secret Sharing Made Short. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:136-146 [Conf ] Leonard M. Adleman , Jonathan DeMarrais A Subexponential Algorithm for Discrete Logarithms over All Finite Fields. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:147-158 [Conf ] Johannes Buchmann , J. Loho , J. Zayer An Implementation of the General Number Field Sieve. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:159-165 [Conf ] Thomas F. Denny , Bruce Dodson , Arjen K. Lenstra , Mark S. Manasse On the Factorization of RSA-120. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:166-174 [Conf ] Antoon Bosselaers , René Govaerts , Joos Vandewalle Comparison of Three Modular Reduction Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:175-186 [Conf ] Ishai Ben-Aroya , Eli Biham Differtial Cryptanalysis of Lucifer. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:187-199 [Conf ] Kazuo Ohta , Mitsuru Matsui Differential Attack on Message Authentication Codes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:200-211 [Conf ] Bart Preneel , Marnix Nuttin , Vincent Rijmen , Johan Buelens Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:212-223 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle Weak Keys for IDEA. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:224-231 [Conf ] Mihir Bellare , Phillip Rogaway Entity Authentication and Key Distribution. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:232-249 [Conf ] Ivan Damgård , Torben P. Pedersen , Birgit Pfitzmann On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:250-265 [Conf ] Matthew K. Franklin , Stuart Haber Joint Encryption and Message-Efficient Secure Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:266-277 [Conf ] Avrim Blum , Merrick L. Furst , Michael J. Kearns , Richard J. Lipton Cryptographic Primitives Based on Hard Learning Problems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:278-291 [Conf ] Niels Ferguson Extensions of Single-term Coins. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:292-301 [Conf ] Stefan Brands Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). [Citation Graph (1, 0)][DBLP ] CRYPTO, 1993, pp:302-318 [Conf ] Claude Crépeau , Joe Kilian Discreet Solitary Games. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:319-330 [Conf ] Jürgen Bierbrauer , Thomas Johansson , Gregory Kabatianskii , Ben J. M. Smeets On Families of Hash Functions via Geometric Codes and Concatenation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:331-342 [Conf ] Thomas Johansson On the Construction of Perfect Authentication Codes that Permit Arbitration. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:343-354 [Conf ] Peter Gemmell , Moni Naor Codes for Interactive Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:355-367 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle Hash Functions Based on Block Ciphers: A Synthetic Approach. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:368-378 [Conf ] Walter Hohl , Xuejia Lai , Thomas Meier , Christian Waldvogel Security of Iterated Hash Functions Based on Block Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:379-390 [Conf ] Jacques Patarin , Pascal Chauvaud Improved Algorithms for the Permuted Kernel Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:391-402 [Conf ] Luke O'Connor On the Distribution of Characteristics in Composite Permutations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:403-412 [Conf ] Chuan-Ming Li , Tzonelih Hwang , Narn-Yih Lee Remark on the Threshold RSA Signature Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:413-420 [Conf ] Chae Hoon Lim , Pil Joong Lee Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:420-434 [Conf ] Don Coppersmith , Jacques Stern , Serge Vaudenay Attacks on the Birational Permutation Signature Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:435-443 [Conf ] Amos Beimel , Benny Chor Interaction in Key Distribution Schemes (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:444-455 [Conf ] Frank Thomson Leighton , Silvio Micali Secret-Key Agreement without Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:456-479 [Conf ] Amos Fiat , Moni Naor Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:480-491 [Conf ]