Conferences in DBLP
Donald W. Davies The Transition from Mechanisms to Electronic Computers, 1940 to 1950. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:1-21 [Conf ] Lars R. Knudsen Cryptanalysis of LOKI. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:22-35 [Conf ] Lawrence Brown , Matthew Kwan , Josef Pieprzyk , Jennifer Seberry Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:36-50 [Conf ] Hiroshi Miyano A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:51-58 [Conf ] Kwangjo Kim Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:59-72 [Conf ] Jun-Hui Yang , Zong-Duo Dai , Kencheng Zeng The Data Base of Selected Permutations (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:73-81 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:82-96 [Conf ] Babak Sadeghiyan , Yuliang Zheng , Josef Pieprzyk How to Construct A Family of Strong One Way Permutations. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:97-110 [Conf ] Wakaha Ogata , Kaoru Kurosawa On Claw Free Families. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:111-123 [Conf ] Yuliang Zheng , Thomas Hardjono , Josef Pieprzyk Sibling Intractable Function Families and Their Applications (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:124-138 [Conf ] Kazuo Ohta , Tatsuaki Okamoto A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:139-148 [Conf ] Hung-Yu Lin , Lein Harn A Generalized Secret Sharing Scheme With Cheater Detection. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:149-158 [Conf ] Chi-Sung Laih , Lein Harn Generalized Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:159-166 [Conf ] Reihaneh Safavi-Naini Feistel Type Authentication Codes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:170-178 [Conf ] Man Y. Rhee Research Activities on Cryptology in Korea. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:179-193 [Conf ] Babak Sadeghiyan , Josef Pieprzyk On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:194-209 [Conf ] Shimon Even , Yishay Mansour A Construction of a Cioher From a Single Pseudorandom Permutation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:210-224 [Conf ] Josef Pieprzyk , Babak Sadeghiyan Optima Perfect Randomizers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:225-236 [Conf ] Matthew Kwan , Josef Pieprzyk A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:237-246 [Conf ] Hikaru Morita , Kazuo Ohta , Shoji Miyaguchi Results of Switching-Closure-Test on FEAL (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:247-252 [Conf ] Jun-ichi Mizusawa IC-Cards and Telecommunication Services. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:253-264 [Conf ] Atsushi Shimbo , Shin-ichi Kawamura Cryptanalysis of Several Conference Key Distribution Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:265-276 [Conf ] Andrew Klapper , Mark Goresky Revealing Information with Partial Period Correlations (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:277-287 [Conf ] Joost Meijers , Johan van Tilburg Extended Majority Voting and Private-Key Algebraic-Code Encryptions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:288-298 [Conf ] Bruce Goldburg , Ed Dawson , S. Sridharan A Secure Analog Speech Scrambler Using the Discrete Cosine Transform. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:299-311 [Conf ] Lein Harn , Hung-Yu Lin On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:312-320 [Conf ] Takeshi Saito , Kaoru Kurosawa , Kouichi Sakurai 4 Move Perfect ZKIP of Knowledge with No Assumption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:321-330 [Conf ] Toshiya Itoh , Kouichi Sakurai On the Complexity of Constant Round ZKIP of Possession of Knowledge. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:331-345 [Conf ] Lance Fortnow , Mario Szegedy On the Power of Two-Local Random Reductions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:346-351 [Conf ] Joan Feigenbaum , Rafail Ostrovsky A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:352-359 [Conf ] Yvo Desmedt , Mike Burmester An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:360-367 [Conf ] Tatsuaki Okamoto An Extensin of Zero-Knowledge Proofs and Its Applications. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:368-381 [Conf ] Toshiya Itoh , Kouichi Sakurai , Hiroki Shizuya Any Language in IP Has a Divertable ZKIP. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:382-396 [Conf ] Chaosheng Shu , Tsutomu Matsumoto , Hideki Imai A Multi-Purpose Proof System - for Identity and Membership Proofs. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:397-411 [Conf ] Marie-Jeanne Toussaint Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:412-426 [Conf ] Ronald L. Rivest Cryptography and Machine Learning. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:427-439 [Conf ] Jørgen Brandt , Ivan Damgård , Peter Landrock Speeding up Prime Number Generation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:440-449 [Conf ] Chi-Sung Laih , Sung-Ming Yen , Lein Harn Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:450-459 [Conf ] Atsuko Miyaji On Ordinary Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:460-469 [Conf ] Antoine Joux , Jacques Stern Cryptanalysis of Another Knapsack Cryptosystem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:470-476 [Conf ] Joan Daemen , Antoon Bosselaers , René Govaerts , Joos Vandewalle Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:477-480 [Conf ] Ronald L. Rivest On NIST's Proposed Digital Signature Standard. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:481-484 [Conf ] Toshinobu Kaneko A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:485-488 [Conf ] Matthew Kwan Simultaneous Attacks in Differential Cryptanalysis (Getting More Pairs Per Encryption). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:489-492 [Conf ] Stig Fr. Mjølsnes Privacy, Cryptographic Pseudonyms, and The State of Health. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:493-494 [Conf ] Joan Daemen Limitations of the Even-Mansour Construction. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:495-498 [Conf ]