year |
venue |
title |
pages |
1994 | asiacrypt | Linear Cryptanalysis of LOKI and s2DES | 293-303 |
1994 | asiacrypt | Combinatorial Interpretation of Secret Sharing Schemes | 55-64 |
1994 | asiacrypt | Security of the Center in Key Distribution Schemes | 333-341 |
1994 | asiacrypt | Low Exponent Attack against Elliptic Curve RSA | 376-383 |
1994 | asiacrypt | Efficient Electronic Money (Extended Abstract) | 153-163 |
1994 | asiacrypt | Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources | 365-375 |
1994 | asiacrypt | Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications | 224-237 |
1994 | asiacrypt | Information Security Aspects of Spread Spectrum Systems | 193-208 |
1994 | asiacrypt | A Digital Signature Scheme Based on Linear Error-correcting Block Codes | 238-248 |
1994 | asiacrypt | How to Prevent Buying of Votes in Computer Elections | 164-170 |
1994 | asiacrypt | A Unified Markow Approach to Differential and Linear Cryptanalysis | 387-397 |
1994 | asiacrypt | The Magic Words are Squeamish Ossifrage | 263-277 |
1994 | asiacrypt | Cryptanalysis of Multiple Modes of Operation | 278-292 |
1994 | asiacrypt | How to Strengthen DES Using Existing Hardware | 398-412 |
1994 | asiacrypt | DESV-1: A Variation of the Data Encryption Standard (DES) | 427-430 |
1994 | asiacrypt | Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes | 33-41 |
1994 | asiacrypt | Factoring: The DNA Solution | 419-423 |
1994 | asiacrypt | Some Cryptographic Properties of Exponential Functions | 415-418 |
1994 | asiacrypt | Secure Acceleration of DSS Signatures Using Insecure Server | 249-259 |
1994 | asiacrypt | Collisions and Inversions for Damgård's Whole Hash Function | 307-321 |
1994 | asiacrypt | Attacking the SL2 Hashing Scheme | 322-330 |
1994 | asiacrypt | Incidence Structures for Key Sharing (Extended Abstract) | 342-353 |
1994 | asiacrypt | Multifeature Security through Homomorphic Encryption | 1-17 |
1994 | asiacrypt | Semi-bent Functions | 107-118 |
1994 | asiacrypt | Design and Analysis of Key Exchange Protocols via Secure Channel Identification | 171-181 |
1994 | asiacrypt | Formal Verification of Cryptographic Protocols: A Survey | 135-150 |
1994 | asiacrypt | A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function | 67-79 |
1994 | asiacrypt | On the Linear Complexity of Nonlinear Filtered PN-sequences | 80-90 |
1994 | asiacrypt | Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography | 21-32 |
1994 | asiacrypt | Combinatorial Structure of A-codes with r-fold Security | 211-223 |
1994 | asiacrypt | Zero-Knowledge Proofs af Computational Power in the Shared String Model | 182-192 |
1994 | asiacrypt | On Sharing Many Secrets (Extended Abstract) | 42-54 |
1994 | asiacrypt | Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract) | 119-132 |
1994 | asiacrypt | Intrinsic Statistical Weakness of Keystream Generators | 91-103 |
1994 | asiacrypt | A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms | 357-364 |
1994 | asiacrypt | Can One Design a Signature Scheme Based on Error-Correctin Codes? | 424-426 |
1994 | crypto | Cryptography in the Commercial World --- Hardware Aspects | |
1994 | crypto | Cryptography in the Commercial World --- Software Aspects | |
1994 | crypto | Securing the Information Highway | |
1994 | crypto | Hashing with $SL_2$ | 40-49 |
1994 | crypto | Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext | 369-382 |
1994 | crypto | Directed Acyclic Graphs, One-way Functions and Digital Signatures | 75-82 |
1994 | crypto | Multi-Secret Sharing Schemes | 150-163 |
1994 | crypto | More Flexible Exponentiation with Precomputation | 95-107 |
1994 | crypto | Maintaining Security in the Presence of Transient Faults | 425-438 |
1994 | crypto | Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol | 121-128 |
1994 | crypto | A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem | 359-368 |
1994 | crypto | On the Length of Cryptographic Hash-Values Used in Identification Schemes | 202-215 |
1994 | crypto | Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks | 50-55 |
1994 | crypto | A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences | 332-340 |
1994 | crypto | The First Experimental Cryptanalysis of the Data Encryption Standard | 1-11 |
1994 | crypto | Linear Cryptanalysis of the Fast Data Encipherment Algorithm | 12-16 |
1994 | crypto | Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Algorithms | 271-281 |
1994 | crypto | Designated Confirmer Signatures and Public-Key Encryption are Equivalent | 61-74 |
1994 | crypto | Tracing Traitors | 257-270 |
1994 | crypto | Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings | online |
1994 | crypto | A Parallel Permutation Multiplier for a PGM Crypto-chip | 108-113 |
1994 | crypto | On the Risk of Opening Distributed Keys | 308-317 |
1994 | crypto | Attack on the Cryptographic Scheme NIKS-TAS | 294-307 |
1994 | crypto | Language Dependent Secure Bit Commitment | 188-201 |
1994 | crypto | Incremental Cryptography: The Case of Hashing and Signing | 216-233 |
1994 | crypto | Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols | 174-187 |
1994 | crypto | The Security of Cipher Block Chaining | 341-358 |
1994 | crypto | Secure Voting Using Partially Compatible Homomorphisms | 411-424 |
1994 | crypto | Pitfalls in Designing Substitution Boxes (Extended Abstract) | 383-396 |
1994 | crypto | Cryptographic Randomness from Air Turbulence in Disk Drives | 114-120 |
1994 | crypto | An Identity-Based Signature Scheme with Bounded Life-Span | 83-94 |
1994 | crypto | Linear Cryptanalysis Using Multiple Approximations | 26-39 |
1994 | crypto | A Randomnesss-Rounds Tradeoff in Private Computation | 397-410 |
1994 | crypto | LFSR-based Hashing and Authentication | 129-139 |
1994 | crypto | New Bound on Authentication Code with Arbitration | 140-149 |
1994 | crypto | Designing Identification Schemes with Keys of Short Size | 164-173 |
1994 | crypto | An Efficient Existentially Unforgeable Signature Scheme and its Applications | 234-246 |
1994 | crypto | Cryptanalysis of Cryptosystems Based on Remote Chaos Replication | 318-331 |
1994 | crypto | Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders | 56-60 |
1994 | crypto | Fast Generation of Provable Primes Using Search in Arithmetic Progressions | 282-293 |
1994 | crypto | Bounds for Resilient Functions and Orthogonal Arrays | 247-256 |
1994 | crypto | Differential-Linear Cryptanalysis | 17-25 |
1994 | eurocrypt | Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders | 194-204 |
1994 | eurocrypt | The Blinding of Weak Signatures (Extended Abstract) | 67-76 |
1994 | eurocrypt | Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard | 77-85 |
1994 | eurocrypt | Formal Requirements for Key Distribution Protocols | 320-331 |
1994 | eurocrypt | Near Optimal Unconditionally Secure Authentication | 244-253 |
1994 | eurocrypt | Single-Term Divisible Electronic Coins | 306-319 |
1994 | eurocrypt | Visual Cryptography | 1-12 |
1994 | eurocrypt | (title unknown) | |
1994 | eurocrypt | Optimal Asymmetric Encryption | 92-111 |
1994 | eurocrypt | Links Between Differential and Linear Cryptoanalysis | 356-365 |
1994 | eurocrypt | On Correlation Between the Order of S-boxes and the Strength of DES | 366-375 |
1994 | eurocrypt | Comments on Soviet Encryption Algorithm | 433-438 |
1994 | eurocrypt | Linear Approximation of Block Ciphers | 439-444 |
1994 | eurocrypt | Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem | 182-193 |
1994 | eurocrypt | Designated Confirmer Signatures | 86-91 |
1994 | eurocrypt | How to Break and Repair Leighton and Micali's Key Agreement Protocol | 299-305 |
1994 | eurocrypt | Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers | 230-243 |
1994 | eurocrypt | Parallel Divertibility of Proofs of Knowledge (Extended Abstract) | 140-155 |
1994 | eurocrypt | New Group Signature Schemes (Extended Abstract) | 171-181 |
1994 | eurocrypt | Feedback Registers Based on Ramified Extensions of the 2-Adic Numbers (Extended Abstract) | 215-222 |
1994 | eurocrypt | The Self-Shrinking Generator | 205-214 |
1994 | eurocrypt | General Lower Bound for the Linear Complexity of the Product of Shift-Register Sequences | 223-229 |
1994 | eurocrypt | A Systematic Attack on Clock Controlled Cascades | 450-455 |
1994 | eurocrypt | A Secure and Efficient Conference Key Distribution System (Extended Abstract) | 275-286 |
1994 | eurocrypt | A Multiple-Iterated Trapdoor for Dense Compact Knapsacks | 112-130 |
1994 | eurocrypt | On A²-Codes Including Arbiter's Attacks | 456-460 |
1994 | eurocrypt | Linking Information Reconciliation and Privacy Amplification (Extended Abstract) | 266-274 |
1994 | eurocrypt | A Practical Attack against Knapsack based Hash Functions (Extended Abstract) | 58-66 |
1994 | eurocrypt | Breaking Efficient Anonymous Channel | 332-340 |
1994 | eurocrypt | Blind Signatures Based on the Discrete Logarithm Problem | 428-432 |
1994 | eurocrypt | Space Requirements for Broadcast Encryption | 287-298 |
1994 | eurocrypt | On the Dealer's Randomness Required in Secret Sharing Schemes | 35-46 |
1994 | eurocrypt | Black Box Cryptoanalysis of Hash Networks Based on Multipermutations | 47-57 |
1994 | eurocrypt | Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings | online |
1994 | eurocrypt | Relationships Among Nonlinear Criteria (Extended Abstract) | 376-388 |
1994 | eurocrypt | On the Security of Some Cryptosystems Based on Error-correcting Codes | 131-139 |
1994 | eurocrypt | Q-Deformed Quantum Cryptography | 468-472 |
1994 | eurocrypt | The Size of a Share Must Be Large | 13-22 |
1994 | eurocrypt | Methodology for Digital Money based on General Cryptographic Tools | 156-170 |
1994 | eurocrypt | New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract) | 419-424 |
1994 | eurocrypt | New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM | 410-418 |
1994 | eurocrypt | Memory Efficient Variants of Public-Key Schemes for Smart Card Applications | 445-449 |
1994 | eurocrypt | MIMD-Factorisation on Hypercubes | 400-409 |
1994 | eurocrypt | Efficient Exponentiation using Procomputation and Vector Addition Chains | 389-399 |
1994 | eurocrypt | Blackmailing using Undeniable Signatures | 425-427 |
1994 | eurocrypt | Authentication Codes in Plaintext and Chosen-content Attacks | 254-265 |
1994 | eurocrypt | A Linear Construction of Perfect Secret Sharing Schemes | 23-34 |
1994 | eurocrypt | On Matsui's Linear Cryptanalysis | 341-355 |
1994 | eurocrypt | An Improvement of Davies' Attack on DES | 461-467 |
1994 | fse | Linear Cryptanalysis Using Multiple Approximations and FEAL | 249-264 |
1994 | fse | Feedback with Carry Shift Registers over Finite Fields (extended abstract) | 170-178 |
1994 | fse | Truncated and Higher Order Differentials | 196-211 |
1994 | fse | How to Exploit the Intractability of Exact TSP for Cryptography | 298-304 |
1994 | fse | A Free Energy Minimization Framework for Inference Problems in modulo 2 Arithmetic | 179-195 |
1994 | fse | SAFER K-64: One Year Later | 212-241 |
1994 | fse | S-boxes and Round Functions with Controllable Linearity and Differential Uniformity | 111-130 |
1994 | fse | Properties of Linear Approximation Tables | 131-136 |
1994 | fse | A Fast Homomorphic Coding Algorithm Based on Arithmetic Coding | 329-345 |
1994 | fse | FSE'94 - Introduction | 1-5 |
1994 | fse | Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers | 242-248 |
1994 | fse | Cryptanalysis of McGuffin | 353-358 |
1994 | fse | The RC5 Encryption Algorithm | 86-96 |
1994 | fse | On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER | 286-297 |
1994 | fse | Additive and Linear Structures of Cryptographic Functions | 75-85 |
1994 | fse | TEA, a Tiny Encryption Algorithm | 363-366 |
1994 | fse | Searching for the Optimum Correlation Attack | 137-143 |
1994 | fse | On Fibonacci Keystream Generators | 346-352 |
1994 | fse | Correlation Matrices | 275-285 |
1994 | fse | Performance of Block Ciphers and Hash Functions - One Year Later | 359-362 |
1994 | fse | Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings | online |
1994 | fse | Clock-Controlled Pseudorandom Generators on Finite Groups | 6-21 |
1994 | fse | Binary Cyclotomic Generators | 29-60 |
1994 | fse | Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity | 61-74 |
1994 | fse | A Known Plaintext Attack on the PKZIP Stream Cipher | 144-153 |
1994 | fse | The MacGuffin Block Cipher Algorithm | 97-110 |
1994 | fse | How to Reverse Engineer an EES Device | 305-328 |
1994 | fse | Problems with the Linear Cryptanalysis of DES Using More Than One Active S-box per Round | 265-274 |
1994 | fse | Linear Cryptanalysis of Stream Ciphers | 154-169 |
1994 | fse | On Random Mappings and Random Permutations | 22-28 |
1994 | jofc | Functional Inversion and Communication Complexity | 153-170 |
1994 | jofc | New Types of Cryptanalytic Attacks Using Related Keys | 229-246 |
1994 | jofc | Definitions and Properties of Zero-Knowledge Proof Systems | 1-32 |
1994 | jofc | Factorizations in the Elementary Abelian p-Group and Their Cryptographic Significance | 201-212 |
1994 | jofc | On the Structure of the Privacy Hierarchy | 53-60 |
1994 | jofc | Three System for Cryptographic Protocol Analysis | 79-130 |
1994 | jofc | The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic | 33-51 |
1994 | jofc | A Weak Cipher that Generates the Symmetric Group | 61-65 |
1994 | jofc | An Analysis of a Class of Algorithms for S-Box Construction | 133-151 |
1994 | jofc | Algebraic Nonlinearity and Its Applications to Cryptography | 213-227 |
1994 | jofc | A Key-Exchange Protocol Using Real Quadratic Fields | 171-199 |
1994 | jofc | Proof of Soundness (Integrity) of Cryptographic Protocols | 69-77 |