Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of crypto 1994
Page
Title
1-11
The First Experimental Cryptanalysis of the Data Encryption Standard
12-16
Linear Cryptanalysis of the Fast Data Encipherment Algorithm
17-25
Differential-Linear Cryptanalysis
26-39
Linear Cryptanalysis Using Multiple Approximations
40-49
Hashing with $SL_2$
50-55
Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks
56-60
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders
61-74
Designated Confirmer Signatures and Public-Key Encryption are Equivalent
75-82
Directed Acyclic Graphs, One-way Functions and Digital Signatures
83-94
An Identity-Based Signature Scheme with Bounded Life-Span
95-107
More Flexible Exponentiation with Precomputation
108-113
A Parallel Permutation Multiplier for a PGM Crypto-chip
114-120
Cryptographic Randomness from Air Turbulence in Disk Drives
121-128
Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol
129-139
LFSR-based Hashing and Authentication
140-149
New Bound on Authentication Code with Arbitration
150-163
Multi-Secret Sharing Schemes
164-173
Designing Identification Schemes with Keys of Short Size
174-187
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
188-201
Language Dependent Secure Bit Commitment
202-215
On the Length of Cryptographic Hash-Values Used in Identification Schemes
216-233
Incremental Cryptography: The Case of Hashing and Signing
234-246
An Efficient Existentially Unforgeable Signature Scheme and its Applications
247-256
Bounds for Resilient Functions and Orthogonal Arrays
257-270
Tracing Traitors
271-281
Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Algorithms
282-293
Fast Generation of Provable Primes Using Search in Arithmetic Progressions
294-307
Attack on the Cryptographic Scheme NIKS-TAS
308-317
On the Risk of Opening Distributed Keys
318-331
Cryptanalysis of Cryptosystems Based on Remote Chaos Replication
332-340
A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences
341-358
The Security of Cipher Block Chaining
359-368
A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem
369-382
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext
383-396
Pitfalls in Designing Substitution Boxes (Extended Abstract)
397-410
A Randomnesss-Rounds Tradeoff in Private Computation
411-424
Secure Voting Using Partially Compatible Homomorphisms
425-438
Maintaining Security in the Presence of Transient Faults