Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of asiacrypt 1994
Page
Title
1-17
Multifeature Security through Homomorphic Encryption
21-32
Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography
33-41
Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes
42-54
On Sharing Many Secrets (Extended Abstract)
55-64
Combinatorial Interpretation of Secret Sharing Schemes
67-79
A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function
80-90
On the Linear Complexity of Nonlinear Filtered PN-sequences
91-103
Intrinsic Statistical Weakness of Keystream Generators
107-118
Semi-bent Functions
119-132
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract)
135-150
Formal Verification of Cryptographic Protocols: A Survey
153-163
Efficient Electronic Money (Extended Abstract)
164-170
How to Prevent Buying of Votes in Computer Elections
171-181
Design and Analysis of Key Exchange Protocols via Secure Channel Identification
182-192
Zero-Knowledge Proofs af Computational Power in the Shared String Model
193-208
Information Security Aspects of Spread Spectrum Systems
211-223
Combinatorial Structure of A-codes with r-fold Security
224-237
Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications
238-248
A Digital Signature Scheme Based on Linear Error-correcting Block Codes
249-259
Secure Acceleration of DSS Signatures Using Insecure Server
263-277
The Magic Words are Squeamish Ossifrage
278-292
Cryptanalysis of Multiple Modes of Operation
293-303
Linear Cryptanalysis of LOKI and s
2
DES
307-321
Collisions and Inversions for Damgård's Whole Hash Function
322-330
Attacking the SL
2
Hashing Scheme
333-341
Security of the Center in Key Distribution Schemes
342-353
Incidence Structures for Key Sharing (Extended Abstract)
357-364
A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms
365-375
Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources
376-383
Low Exponent Attack against Elliptic Curve RSA
387-397
A Unified Markow Approach to Differential and Linear Cryptanalysis
398-412
How to Strengthen DES Using Existing Hardware
415-418
Some Cryptographic Properties of Exponential Functions
419-423
Factoring: The DNA Solution
424-426
Can One Design a Signature Scheme Based on Error-Correctin Codes?
427-430
DESV-1: A Variation of the Data Encryption Standard (DES)