Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eurocrypt 1988
Page
Title
3-10
Key Agreements Based on Function Composition
11-19
Security of Improved Identity-Based Conference Key Distribution Systems
23-33
Subliminal-Free Authentication and Signature (Extended Abstract)
35-49
Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts
51-55
Authentication Codes with Multiple Arbiters (Extended Abstract)
57-75
Some Constructions for Authentication-Secrecy Codes
77-84
Efficient Zero-Knowledge Identification Scheme for Smart Cards
87-95
A Smart Card Implementation of the Fiat-Shamir Identification Scheme
97-106
Manipulations and Errors, Detection and Localization
107-122
Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity
123-128
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory
129-156
A Generalized Birthday Attack
159-166
An Interactive Data Exchange Protocol Based on Discrete Exponentiation
167-176
Anonymous and Verifiable Registration in Databases
177-182
Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA
183-188
Passports and Visas Versus IDS (Extended Abstract)
191-209
The Probabilistic Theory of Linear Complexity
211-223
A Probabilistic Primality test Based on the Properties of Certain Generalized Lucas Numbers
225-232
On the Construction of Random Number Generators and Random Function Generators
235-243
Factorization of Large Integers on a Massively Parallel Computer
245-250
A Fast Modular Arithmetic Algorithm Using a Residue Table (Extended Abstract)
251-255
Fast Exponentiation in
GF(2
n
)
257-264
Fast RSA-Hardware: Dream or Reality?
267-274
Properties of the Euler Totient Function Modulo 24 and Some of its Cryptographic Implications
275-280
An Observation on the Security of McEliece's Public-Key Cryptosystem
281-291
How to Break Okamoto's Cryptosystem by Reducing Lattice Bases
293-299
Cryptanalysis of F.E.A.L
301-314
Fast Correltaion Attacks on Stream Ciphers (Extended Abstract)
317-324
A New Class of Nonlinear Functions for Running-key Generators (Extended Abstract)
325-330
Windmill Generators: A Generalization and an Observation of How Many There Are
331-343
Lock-In Effect in Cascades of Clock-Controlled Shift-Registers
345-349
Proof of Massey's Conjectured Algorithm
351-357
Linear Recurring m-Arrays
361-373
Substantial Number of Cryptographic Keys and Its Application to Encryption Designs
375-387
A Measure of Semiequivocation
389-401
Some New Classes of Geometric Threshold Schemes
405-414
A Universal Algorithm for Homophonic Coding
415-418
A New Probabilistic Encryption Scheme
419-453
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption
455-467
Some Applications of Multiple Key Ciphers