


default search action
ASIACRYPT 1994: Wollongong, Australia
- Josef Pieprzyk

, Reihaneh Safavi-Naini:
Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings. Lecture Notes in Computer Science 917, Springer 1995, ISBN 3-540-59339-X
Invited Lecture I
- Thomas Beth:

Multifeature Security through Homomorphic Encryption. 1-17
Secret Sharing
- Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester:

Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. 21-32 - Koji Okada, Kaoru Kurosawa:

Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes. 33-41 - Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:

On Sharing Many Secrets (Extended Abstract). 42-54 - Kaoru Kurosawa, Koji Okada:

Combinatorial Interpretation of Secret Sharing Schemes. 55-64
Stream Ciphers
- Miodrag J. Mihaljevic:

A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. 67-79 - Amparo Fúster-Sabater, Pino Caballero-Gil

:
On the Linear Complexity of Nonlinear Filtered PN-sequences. 80-90 - Jovan Dj. Golic:

Intrinsic Statistical Weakness of Keystream Generators. 91-103
Cryptographic Functions
- Seongtaek Chee, Sangjin Lee, Kwangjo Kim:

Semi-bent Functions. 107-118 - Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:

Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). 119-132
Invited Lecture II
- Catherine A. Meadows:

Formal Verification of Cryptographic Protocols: A Survey. 135-150
Protocols
- Yacov Yacobi:

Efficient Electronic Money (Extended Abstract). 153-163 - Valtteri Niemi, Ari Renvall:

How to Prevent Buying of Votes in Computer Elections. 164-170 - Colin Boyd, Wenbo Mao:

Design and Analysis of Key Exchange Protocols via Secure Channel Identification. 171-181 - Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano:

Zero-Knowledge Proofs of Computational Power in the Shared String Model. 182-192
Invited Lectures III
- Hideki Imai:

Information Security Aspects of Spread Spectrum Systems. 193-208
Authentication and Digital Signatures
- Reihaneh Safavi-Naini, Leonid M. Tombak:

Combinatorial Structure of A-codes with r-fold Security. 211-223 - Patrick Horster, Markus Michels, Holger Petersen:

Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. 224-237 - Mohssen Alabbadi, Stephen B. Wicker:

A Digital Signature Scheme Based on Linear Error-correcting Block Codes. 238-248 - Philippe Béguin, Jean-Jacques Quisquater:

Secure Acceleration of DSS Signatures Using Insecure Server. 249-259
Chryptanalysis
- Derek Atkins, Michael Graff, Arjen K. Lenstra, Paul C. Leyland:

The Magic Words are Squeamish Ossifrage. 263-277 - Eli Biham:

Cryptanalysis of Multiple Modes of Operation. 278-292 - Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui:

Linear Cryptanalysis of LOKI and s2DES. 293-303
Hash Functions
- Jacques Patarin:

Collisions and Inversions for Damgård's Whole Hash Function. 307-321 - Chris Charnes, Josef Pieprzyk:

Attacking the SL2 Hashing Scheme. 322-330
Key Distribution
- Kaoru Kurosawa, Koji Okada, Keiichi Sakano:

Security of the Center in Key Distribution Schemes. 333-341 - Tsutomu Matsumoto:

Incidence Structures for Key Sharing (Extended Abstract). 342-353
Public Key Cryptography
- Peter Smith, Christopher Skinner:

A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms. 357-364 - Masayuki Abe, Hikaru Morita:

Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources. 365-375 - Kaoru Kurosawa, Koji Okada, Shigeo Tsujii:

Low Exponent Attack against Elliptic Curve RSA. 376-383
Block Cipher Algorithms
- Luke O'Connor, Jovan Dj. Golic:

A Unified Markow Approach to Differential and Linear Cryptanalysis. 387-397 - Eli Biham, Alex Biryukov:

How to Strengthen DES Using Existing Hardware. 398-412
Rump Session
- Xingong Chang, Zong-Duo Dai, Guang Gong:

Some Cryptographic Properties of Exponential Functions. 415-418 - Donald Beaver:

Factoring: The DNA Solution. 419-423 - Jacques Stern:

Can One Design a Signature Scheme Based on Error-Correctin Codes? 424-426 - Gary Carter, Andrew J. Clark, Lauren Nielsen:

DESV-1: A Variation of the Data Encryption Standard (DES). 427-430

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














