Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of asiacrypt 1996
Page
Title
1-14
A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves
15-25
Cryptographic Protocols Based on Real-Quadratic A-fields
26-35
Minding your p's and q`s
36-49
Authenticated Multi-Party Key Agreement
50-56
Cryptography and the Internet: Lessons and Challenges
57-64
Generating Standard DSA Signatures Without Long Inversion
65-76
A Fast Software Implementation for Arithmetic Operations in GF(2
n
)
77-90
Hash Functions Based on Block Ciphers and Quaternary Codes
91-104
Generalized Feistel Networks
105-115
On Applying Linear Cryptanalysis to IDEA
116-124
A Multi-Recastable Ticket Scheme for Electronic Elections
125-132
Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme
133-144
Observations on Non-repudiation
145-158
On the Efficiency of One-Time Digital Signatures
159-172
A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes
173-184
Electronic Money and Key Management from Global and Regional Points of View
185-195
Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification
196-209
Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible
210-217
Key Sharing Based on the Wire-Tap Channel Type II Concept with Noisy Main Channel
218-231
Generalization of Higher Order SAC to Vector Output Boolean Functions
232-243
On the Correlation Immune Functions and Their Nonlinearity
244-251
How to Date Blind Signatures
252-265
Provably Secure Blind Signature Schemes
266-275
Cost-Effective Payment Schemes with Privacy Regulation
276-285
Mis-representation of Identities in E-cash Schemes and how to Prevent it
286-300
"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash
301-310
The Validation of Cryptographic Algorithms
311-321
Convertible Group Signatures
322-333
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem
334-345
On the Risk of Disruption in Several Multiparty Signature Schemes
346-359
Correlation Attacks on Cascades of Clock Controlled Shift Registers
360-367
Conditional Correlation Attack on Nonlinear Filter Generators
368-381
The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes
382-394
A World Wide Number Field Sieve Factoring Record: On to 512 Bits