Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings
Page
Title
1-12
Visual Cryptography
13-22
The Size of a Share Must Be Large
23-34
A Linear Construction of Perfect Secret Sharing Schemes
35-46
On the Dealer's Randomness Required in Secret Sharing Schemes
47-57
Black Box Cryptoanalysis of Hash Networks Based on Multipermutations
58-66
A Practical Attack against Knapsack based Hash Functions (Extended Abstract)
67-76
The Blinding of Weak Signatures (Extended Abstract)
77-85
Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard
86-91
Designated Confirmer Signatures
92-111
Optimal Asymmetric Encryption
112-130
A Multiple-Iterated Trapdoor for Dense Compact Knapsacks
131-139
On the Security of Some Cryptosystems Based on Error-correcting Codes
140-155
Parallel Divertibility of Proofs of Knowledge (Extended Abstract)
156-170
Methodology for Digital Money based on General Cryptographic Tools
171-181
New Group Signature Schemes (Extended Abstract)
182-193
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
194-204
Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders
205-214
The Self-Shrinking Generator
215-222
Feedback Registers Based on Ramified Extensions of the 2-Adic Numbers (Extended Abstract)
223-229
General Lower Bound for the Linear Complexity of the Product of Shift-Register Sequences
230-243
Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers
244-253
Near Optimal Unconditionally Secure Authentication
254-265
Authentication Codes in Plaintext and Chosen-content Attacks
266-274
Linking Information Reconciliation and Privacy Amplification (Extended Abstract)
275-286
A Secure and Efficient Conference Key Distribution System (Extended Abstract)
287-298
Space Requirements for Broadcast Encryption
299-305
How to Break and Repair Leighton and Micali's Key Agreement Protocol
306-319
Single-Term Divisible Electronic Coins
320-331
Formal Requirements for Key Distribution Protocols
332-340
Breaking Efficient Anonymous Channel
341-355
On Matsui's Linear Cryptanalysis
356-365
Links Between Differential and Linear Cryptoanalysis
366-375
On Correlation Between the Order of S-boxes and the Strength of DES
376-388
Relationships Among Nonlinear Criteria (Extended Abstract)
389-399
Efficient Exponentiation using Procomputation and Vector Addition Chains
400-409
MIMD-Factorisation on Hypercubes
410-418
New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM
419-424
New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract)
425-427
Blackmailing using Undeniable Signatures
428-432
Blind Signatures Based on the Discrete Logarithm Problem
433-438
Comments on Soviet Encryption Algorithm
439-444
Linear Approximation of Block Ciphers
445-449
Memory Efficient Variants of Public-Key Schemes for Smart Card Applications
450-455
A Systematic Attack on Clock Controlled Cascades
456-460
On A²-Codes Including Arbiter's Attacks
461-467
An Improvement of Davies' Attack on DES
468-472
Q-Deformed Quantum Cryptography