Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings
Page
Title
1-11
On the Relation between A-Codes and Codes Correcting Independent Errors
12-27
Optimal Authentication Systems
28-39
Factoring Integers Using SIMD Sieves
40-49
A New Elliptic Curve Based Analogue of RSA
50-54
Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups
55-64
Differentially Uniform Mappings for Cryptography
65-76
On Almost Perfect Nonlinear Permutations
77-101
Two New Classes of Bent Functions
102-117
Boolean Functions Satisfying a Higher Order Strict Avalanche Criterion
118-125
Size of Shares and Probability of Cheating in Threshold Schemes
126-141
Nonperfect Secret Sharing Schemes and Matroids
142-150
From the Memoirs of a Norwegian Cryptologist
151-158
On the Linear Complexity of Products of Shift-Register Sequences
159-167
Resynchronization Weaknesses in Synchronous Stream Ciphers
168-180
Blind Synchronization of m-Sequnces with Even Span
181-199
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract)
200-217
Practical and Provably Secure Release of a Secret and Exchange of Signatures
218-232
Subliminal Communication is Easy Using the DSA
233-239
Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme
240-247
On a Limitation of BAN Logic
248-259
Efficient Anonymous Channel and All/Nothing Election Scheme
260-266
Untransferable Rights in a Client-Independent Server Environment
267-273
Interactive Hashing Simplifies Zero-Knowledge Protocol Design
274-285
One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract)
286-292
The Breaking of the AR Hash Function
293-304
Collisions for the Compressin Function of MD5
305-317
How to Find and Avoid Collisions for the Knapsack Hash Function
318-328
Single Term Off-Line Coins
329-343
Improved Privacy in Wallets with Observers (Extended Abstract)
344-359
Distance-Bounding Protocols (Extended Abstract)
360-370
On the Distribution of Characteristics in Bijective Mappings
371-385
On the Security of the IDEA Block Cipher
386-397
Linear Cryptoanalysis Method for DES Cipher
398-409
New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract)
410-423
Secret-Key Reconciliation by Public Discussion
424-434
Global, Unpredictable Bit Generation Without Broadcast
435-439
On Schnorr's Preprocessing for Digital Signature Schemes
440-442
Cryptoanalysis of the Chang-Wu-Chen Key Distribution System
443-447
An Alternate Explanation of two BAN-logic "failures"
448-452
The Consequences of Trust in Shared Secret Schemes
453-460
Markov Ciphers and Alternating Groups
461-465
On Key Distribution and Authentication in Mobile Radio Networks