Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of auscrypt 1992
Page
Title
3-14
Treshold Cryptosystems (invited talk)
15-26
Authentication Codes with Perfect Protection
27-32
Practical Proven Secure Authentication with Arbitration
35-47
Authentication Codes under Impersonation Attack
48-55
Cumulative Arrays and Geometric Secret Sharing Schemes
56-66
Nonperfect Secret Sharing Schemes
67-79
A Construction of Practical Secret Sharing Schemes using Linear Block Codes
83-104
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output
105-121
On the Power of Memory in the Design of Collision Resistant Hash Functions
122-132
A Practical Digital Multisignature Scheme Based on Discrete Logarithms
133-142
Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party
145-155
Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion
156-164
Linear Nonequivalence versus Nonlinearity
165-181
Constructing Large Cryptographically Strong S-boxes
185-195
Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk)
196-208
Cryptanalysis of LOKI91
209-215
Cryptanalysis of Summation Generator
219-230
Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols
231-243
Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes
244-251
A Practical Secret Voting Scheme for Large Scale Elections
252-260
Privacy for Multi-Party Protocols
263-274
New Protocols for Electronic Money
275-295
Modelling and Analyzing Cryprographic Protocols Using Petri Nets
296-307
On Verifiable Implicit Asking Protocols for RSA Computation
308-323
Modified Maurer-Yacobi`s scheme and its applications
327-338
The Vulnerability of Geometric Sequences Based on Fields on Odd Characteristic
339-348
A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers
349-356
An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure
357-363
Construction of m-ary de Bruijn Sequences (Extendet abstract)
367-384
Information Technology Security Standards - An Australian Perspective
385-396
Non-Interactive Generation of Shared Pseudorandom Sequences
397-409
A Generalized Description of DES-based and Benes-based Permutationgenerators
413-421
Prime Generation with the Demytko-Miller-Trbuvich Algorithm
422-434
Constructions of Freebly-One-Way Families of Permutations
435-446
On Bit Correlations Among Preimages of "Many to One" One-Way Functions
447-456
The Fast Cascade Exponentation Algorithm and its Applications on Cryptography
459-466
The Design of a Conference Key Distribution System
467-468
Remarks on "The Design of a Conference Key Distribution System"
469-476
Public-Key Cryptosystem Based on the Discrete Logarithm Problem
479-491
Elliptic Curves over F
p
Suitable for Cryptosystems
492-504
The Probability Distribution of the Diffie-Hellman Key
505-516
A Modular Exponentiation Unit Based on Systolic Arrays
517-527
A Comparison of Key Distribution Patterns Constructed from Circle Geometries
531-534
A Block Cipher Method using Combinations of Different Methods under the Control of the User Key
535-538
An Attack on Two Hash Functions by Zheng-Matsumoto-Imai
539-542
Primality Testing with Lucas Functions