Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of auscrypt 1990
Page
Title
2-13
The Implementation of Elliptic Curve Cryptosystems
14-21
Direct Demonstration of the Power to Break Public-Key Cryptosystems
24-31
Continued Fractions and the Berlekamp-Massey Algorithm
32-36
Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key
37-38
K-M Sequence is Forwardly Predictable
39-43
Lower Bounds on the Weight Complexities of Cascaded Binary Sequences
46-57
Secure User Access Control for Public Networks
58-73
Formal Specification and Verification of Secure Communication Protocols
74-95
Network Security Policy Models
96-103
KEYMEX: An expert system for the design of key management schemes
106-121
On The Formal Analysis of PKCS Authentication Protocols
122-139
Some Remarks on Authentication Systems
140-154
Meet-in-the-Middle Attack on Digital Signature Schemes
156-164
A Binary Sequence Generator Based on Ziv-Lempel Source Coding
165-175
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence
176-193
Parallel Generation of Pseudo-Random Sequences
194-205
Large Primes in Stream Cipher Cryptography
208-220
Comparison of Block Ciphers
221-228
Key Scheduling In Des Type Cryptosystems
229-236
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
237-244
Permutation Generators of Alternating Groups
246-264
Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms
265-272
A (non-practical) three-pass identification protocol using coding theory
273-293
Demonstrating Possession without Revealing Factors and its Application
294-305
Anonymous One-Time Signatures and Flexible Untraceable Electronic Cash
308-310
Dyadic Matrices and Their Potential Significance in Cryptography
311-317
A Note on Strong Fibonacci Pseudoprimes
318-326
On the Significance of the Directed Acyclic Word Graph in Cryptology
327-332
Solving Equations in Sequences
334-355
The Practical Application Of State Of The Art Security In Real Environments
356-359
RSA as a Benchmark for Multiprocessor Machines
360-385
Range Equations and Range Matrices: a Study in Statistical Database Security
386-395
Record Encryption in Distributed Databases
398-405
VLSI Design for Exponentiation in GF (2
^{n}
)
406-409
A Fast Modular-multiplication Module for Smart Cards
410-423
Minòs: Extended User Authentication
426-432
Universal Logic Sequences
433-450
The Three Faces of Information Security
451-462
Secure Cryptographic Initialisation