


default search action
ASIACRYPT 1996: Kyongju, Korea
- Kwangjo Kim, Tsutomu Matsumoto:

Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings. Lecture Notes in Computer Science 1163, Springer 1996, ISBN 3-540-61872-4
Discrete Log Based Systems
- Atsuko Miyaji

:
A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. 1-14 - Ingrid Biehl, Bernd Meyer, Christoph Thiel:

Cryptographic Protocols Based on Real-Quadratic A-fields. 15-25 - Ross J. Anderson, Serge Vaudenay:

Minding your p's and q's. 26-35 - Mike Just

, Serge Vaudenay:
Authenticated Multi-Party Key Agreement. 36-49
Invited Talk 1
- Kevin S. McCurley:

Cryptography and the Internet: Lessons and Challenges. 50-56
Efficient Algorithms
- Arjen K. Lenstra:

Generating Standard DSA Signatures Without Long Inversion. 57-64 - Erik De Win, Antoon Bosselaers, Servaas Vandenberghe, Peter De Gersem, Joos Vandewalle:

A Fast Software Implementation for Arithmetic Operations in GF(2n). 65-76
Hash Function and Block Ciphers
- Lars R. Knudsen, Bart Preneel:

Hash Functions Based on Block Ciphers and Quaternary Codes. 77-90 - Kaisa Nyberg:

Generalized Feistel Networks. 91-104 - Philip Hawkes, Luke O'Connor:

On Applying Linear Cryptanalysis to IDEA. 105-115
Cryptographic Protocols
- Chun-I Fan, Chin-Laung Lei:

A Multi-Recastable Ticket Scheme for Electronic Elections. 116-124 - Markus Michels, Patrick Horster:

Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme. 125-132 - Jianying Zhou, Dieter Gollmann:

Observations on Non-repudiation. 133-144
Signature and Identification
- Daniel Bleichenbacher, Ueli M. Maurer:

On the Efficiency of One-Time Digital Signatures. 145-158 - Kouichi Sakurai:

A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes. 159-172
Invited Talk 2
- Shigeo Tsujii:

Electronic Money and Key Management from Global and Regional Points of View. 173-184
Visual Secret Sharing
- Kazukuni Kobara, Hideki Imai:

Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. 185-195
Key Distribution
- Ueli M. Maurer, Stefan Wolf

:
Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. 196-209 - Valeri Korjik, D. Kushnir:

Key Sharing Based on the Wire-Tap Channel Type II Concept with Noisy Main Channel. 210-217
Boolean Functions
- Kaoru Kurosawa, Takashi Satoh:

Generalization of Higher Order SAC to Vector Output Boolean Functions. 218-231 - Seongtaek Chee, Sangjin Lee, Daiki Lee, Soo Hak Sung:

On the Correlation Immune Functions and Their Nonlinearity. 232-243
Electronic Cash 1
- Masayuki Abe, Eiichiro Fujisaki:

How to Date Blind Signatures. 244-251 - David Pointcheval

, Jacques Stern:
Provably Secure Blind Signature Schemes. 252-265 - David M'Raïhi:

Cost-Effective Payment Schemes with Privacy Regulation. 266-275
Electronic Cash 2
- Agnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis:

Mis-representation of Identities in E-cash Schemes and how to Prevent it. 276-285 - Yair Frankel, Yiannis Tsiounis, Moti Yung:

"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash. 286-300
Invited Talk 3
- Jacques Stern:

The Validation of Cryptographic Algorithms. 301-310
Special Signatures
- Seungjoo Kim

, Sungjun Park, Dongho Won:
Convertible Group Signatures. 311-321 - Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto:

How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. 322-333 - Markus Michels, Patrick Horster:

On the Risk of Disruption in Several Multiparty Signature Schemes. 334-345
Stream Ciphers
- Willi Geiselmann, Dieter Gollmann:

Correlation Attacks on Cascades of Clock Controlled Shift Registers. 346-359 - Sangjin Lee, Seongtaek Chee, Sangjoon Park, Sung-Mo Park:

Conditional Correlation Attack on Nonlinear Filter Generators. 360-367
Hard Problems
- Florent Chabaud, Jacques Stern:

The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes. 368-381 - James Cowie, Bruce Dodson, R. Marije Elkenbracht-Huizing, Arjen K. Lenstra, Peter L. Montgomery, Jörg Zayer:

A World Wide Number Field Sieve Factoring Record: On to 512 Bits. 382-394

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














