Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of crypto 1996
Page
Title
1-15
Keying Hash Functions for Message Authentication
16-30
Universal Hashing and Multiple Authentication
31-44
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings
45-60
Asymmetric Cryptography with a Hidden Monomial
61-73
Anonymous Communication and Anonymous Cash
74-82
Weakness in Some Threshold Cryptosystems
83-88
Hidden Collisions on DSS
89-103
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?
104-113
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
114-128
All Bits ax+b mod p are Hard (Extended Abstract)
129-142
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
143-156
Security of $2^t$-Root Identification and Signatures
157-172
Robust and Efficient Sharing of RSA Functions
173-185
New Generation of Secure and Practical RSA-Based Signatures
186-200
Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers
201-215
Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing
216-228
Improved Differential Attacks on RC5
229-236
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude
237-251
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
252-267
How to Protect DES Against Exhaustive Key Search
268-282
Diffie-Hellman Oracles
283-297
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract)
298-312
Fast Hashing on the Pentium
313-328
On Fast and Provably Secure Message Authentication Based on Universal Hashing
329-342
Quantum Cryptography over Underground Optical Fibers
343-357
Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
358-371
Linear Complexity of Periodic Sequences: A General Theory
372-386
Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations
387-400
Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
401-415
New Results on Visual Cryptography