year |
venue |
title |
pages |
1993 | asiacrypt | Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings | |
1993 | asiacrypt | Advances in Cryptology - ASIACRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings | |
1993 | crypto | Interaction in Key Distribution Schemes (Extended Abstract) | 444-455 |
1993 | crypto | An Integrity Check Value Algorithm for Stream Ciphers | 40-48 |
1993 | crypto | A Status Report On the Federal Government Key Escrow System | |
1993 | crypto | Extensions of Single-term Coins | 292-301 |
1993 | crypto | Broadcast Encryption | 480-491 |
1993 | crypto | Secret-Key Agreement without Public-Key Cryptography | 456-479 |
1993 | crypto | Fully Dynamic Secret Sharing Schemes | 110-125 |
1993 | crypto | Remark on the Threshold RSA Signature Scheme | 413-420 |
1993 | crypto | Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks | 420-434 |
1993 | crypto | Joint Encryption and Message-Efficient Secure Computation | 266-277 |
1993 | crypto | Codes for Interactive Authentication | 355-367 |
1993 | crypto | Comparison of Three Modular Reduction Functions | 175-186 |
1993 | crypto | On the Distribution of Characteristics in Composite Permutations | 403-412 |
1993 | crypto | Differential Attack on Message Authentication Codes | 200-211 |
1993 | crypto | Untraceable Off-line Cash in Wallets with Observers (Extended Abstract) | 302-318 |
1993 | crypto | Security of Iterated Hash Functions Based on Block Ciphers | 379-390 |
1993 | crypto | Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings | online |
1993 | crypto | Improved Algorithms for the Permuted Kernel Problem | 391-402 |
1993 | crypto | An Implementation of the General Number Field Sieve | 159-165 |
1993 | crypto | Hash Functions Based on Block Ciphers: A Synthetic Approach | 368-378 |
1993 | crypto | Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds | 212-223 |
1993 | crypto | The Shrinking Generator | 22-39 |
1993 | crypto | Attacks on the Birational Permutation Signature Schemes | 435-443 |
1993 | crypto | Cryptographic Primitives Based on Hard Learning Problems | 278-291 |
1993 | crypto | A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity | 61-72 |
1993 | crypto | Multisecret Threshold Schemes | 126-135 |
1993 | crypto | On the Construction of Perfect Authentication Codes that Permit Arbitration | 343-354 |
1993 | crypto | A Subexponential Algorithm for Discrete Logarithms over All Finite Fields | 147-158 |
1993 | crypto | Discreet Solitary Games | 319-330 |
1993 | crypto | Secret Sharing and Perfect Zero Knowledge | 73-84 |
1993 | crypto | Weak Keys for IDEA | 224-231 |
1993 | crypto | Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract) | 100-109 |
1993 | crypto | Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract) | 49-60 |
1993 | crypto | Entity Authentication and Key Distribution | 232-249 |
1993 | crypto | On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures | 250-265 |
1993 | crypto | Efficient Signature Schemes Based on Birational Permutations | 1-12 |
1993 | crypto | On Message Proof Systems with Known Space Verifiers | 85-99 |
1993 | crypto | Differtial Cryptanalysis of Lucifer | 187-199 |
1993 | crypto | On the Factorization of RSA-120 | 166-174 |
1993 | crypto | Secret Sharing Made Short | 136-146 |
1993 | crypto | A New Identification Scheme Based on Syndrome Decoding | 13-21 |
1993 | crypto | On Families of Hash Functions via Geometric Codes and Concatenation | 331-342 |
1993 | eurocrypt | Untransferable Rights in a Client-Independent Server Environment | 260-266 |
1993 | eurocrypt | Global, Unpredictable Bit Generation Without Broadcast | 424-434 |
1993 | eurocrypt | Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme | online |
1993 | eurocrypt | Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups | 50-54 |
1993 | eurocrypt | Single Term Off-Line Coins | 318-328 |
1993 | eurocrypt | Linear Cryptanalysis Method for DES Cipher | 386-397 |
1993 | eurocrypt | Distance-Bounding Protocols (Extended Abstract) | 344-359 |
1993 | eurocrypt | Differentially Uniform Mappings for Cryptography | 55-64 |
1993 | eurocrypt | On the Distribution of Characteristics in Bijective Mappings | 360-370 |
1993 | eurocrypt | Secret-Key Reconciliation by Public Discussion | 410-423 |
1993 | eurocrypt | On the Security of the IDEA Block Cipher | online |
1993 | eurocrypt | On the Linear Complexity of Products of Shift-Register Sequences | 151-158 |
1993 | eurocrypt | An Alternate Explanation of two BAN-logic "failures" | 443-447 |
1993 | eurocrypt | Cryptoanalysis of the Chang-Wu-Chen Key Distribution System | 440-442 |
1993 | eurocrypt | On the Relation between A-Codes and Codes Correcting Independent Errors | 1-11 |
1993 | eurocrypt | Interactive Hashing Simplifies Zero-Knowledge Protocol Design | 267-273 |
1993 | eurocrypt | Efficient Anonymous Channel and All/Nothing Election Scheme | 248-259 |
1993 | eurocrypt | On Key Distribution and Authentication in Mobile Radio Networks | 461-465 |
1993 | eurocrypt | How to Find and Avoid Collisions for the Knapsack Hash Function | 305-317 |
1993 | eurocrypt | On a Limitation of BAN Logic | 240-247 |
1993 | eurocrypt | Collisions for the Compressin Function of MD5 | 293-304 |
1993 | eurocrypt | Improved Privacy in Wallets with Observers (Extended Abstract) | 329-343 |
1993 | eurocrypt | Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings | online |
1993 | eurocrypt | Two New Classes of Bent Functions | 77-101 |
1993 | eurocrypt | On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract) | 181-199 |
1993 | eurocrypt | Size of Shares and Probability of Cheating in Threshold Schemes | 118-125 |
1993 | eurocrypt | From the Memoirs of a Norwegian Cryptologist | 142-150 |
1993 | eurocrypt | Markov Ciphers and Alternating Groups | 453-460 |
1993 | eurocrypt | Boolean Functions Satisfying a Higher Order Strict Avalanche Criterion | 102-117 |
1993 | eurocrypt | Resynchronization Weaknesses in Synchronous Stream Ciphers | 159-167 |
1993 | eurocrypt | One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) | 274-285 |
1993 | eurocrypt | Practical and Provably Secure Release of a Secret and Exchange of Signatures | 200-217 |
1993 | eurocrypt | The Breaking of the AR Hash Function | 286-292 |
1993 | eurocrypt | On Schnorr's Preprocessing for Digital Signature Schemes | 435-439 |
1993 | eurocrypt | A New Elliptic Curve Based Analogue of RSA | 40-49 |
1993 | eurocrypt | On Almost Perfect Nonlinear Permutations | 65-76 |
1993 | eurocrypt | Nonperfect Secret Sharing Schemes and Matroids | 126-141 |
1993 | eurocrypt | Optimal Authentication Systems | 12-27 |
1993 | eurocrypt | Subliminal Communication is Easy Using the DSA | 218-232 |
1993 | eurocrypt | The Consequences of Trust in Shared Secret Schemes | 448-452 |
1993 | eurocrypt | Factoring Integers Using SIMD Sieves | 28-39 |
1993 | eurocrypt | Blind Synchronization of m-Sequnces with Even Span | 168-180 |
1993 | eurocrypt | New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract) | 398-409 |
1993 | fse | Fast Block Cipher Proposal | 33-40 |
1993 | fse | 2-Adic Shift Registers | 174-178 |
1993 | fse | Practically Secure Feistel Cyphers | 211-221 |
1993 | fse | The Shrinking Generator: Some Practical Considerations | 45-46 |
1993 | fse | Attacks on Double Block Length Hash Functions | 157-165 |
1993 | fse | Encrypting Network Traffic | 64-70 |
1993 | fse | Cryptographic Pseudorandom Numbers in Simulation | 185-190 |
1993 | fse | SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm | 1-17 |
1993 | fse | New Bent Mappings Suitable for Fast Implementation | 179-184 |
1993 | fse | VINO: A Block Cipher Including Variable Permutations | 205-210 |
1993 | fse | Design Principles for Dedicated Hash Functions | 71-82 |
1993 | fse | Performance of Symmetric Ciphers and One-Way Hash Functions | 83-89 |
1993 | fse | A Software-Optimised Encryption Algorithm | 56-63 |
1993 | fse | A Bulk Data Encription Algorithm | 127-134 |
1993 | fse | Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) | 191-204 |
1993 | fse | Parallel FFT-Hashing | 149-156 |
1993 | fse | A Modern Rotor Machine | 47-50 |
1993 | fse | On Finite Automaton One-Key Cryptosystems | 135-148 |
1993 | fse | A New Approach to Block Cipher Design | 18-32 |
1993 | fse | The Differential Cryptanalysis and Design of Natural Stream Ciphers | 101-115 |
1993 | fse | On Modes of Operation | 116-120 |
1993 | fse | Fish: A Fast Software Stream Cipher | 41-44 |
1993 | fse | On the Security of Shift Register Based Keystream Generators | 90-100 |
1993 | fse | Cryptanalysis of Clock Controlled Shift Registers | 121-126 |
1993 | fse | Two Stream Ciphers | 51-55 |
1993 | fse | On Quadratic M-Sequences | 166-173 |
1993 | jofc | A Uniform-Complexity Treatment of Encryption and Zero-Knowledge | 21-53 |
1993 | jofc | A Perfect Zero-Knowledge Proof System for a Problem Equivalent to the Discrete Logarithm | 97-116 |
1993 | jofc | On the Communication Complexity of Zero-Knowledge Proofs | 65-85 |
1993 | jofc | On the Size of Shares for Secret Sharing Schemes | 157-167 |
1993 | jofc | Multiple Assignment Scheme for Sharing Secret | 15-20 |
1993 | jofc | Modifications to the Number Field Sieve | 169-180 |
1993 | jofc | User Impersonation in Key Certification Schemes | 225-232 |
1993 | jofc | Cascade Ciphers: The Importance of Being First | 55-61 |
1993 | jofc | Elliptic Curve Cryptosystems and Their Implementations | 209-224 |
1993 | jofc | A Design of a Fast Pipelined Modular Multiplier Based on a Diminished-Radix Algorithm | 183-208 |
1993 | jofc | A Lower Bound on Authentication After Having Observed a Sequence of Messages | 135-156 |
1993 | jofc | Universal Tests for Nonuniform Distributions | 119-133 |
1993 | jofc | Secret Sharing Over Infinite Domains | 87-95 |
1993 | jofc | Arithmetic Operations in GF(2m) | 3-13 |