default search action
ASIACRYPT 1994: Wollongong, Australia
- Josef Pieprzyk, Reihaneh Safavi-Naini:
Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings. Lecture Notes in Computer Science 917, Springer 1995, ISBN 3-540-59339-X
Invited Lecture I
- Thomas Beth:
Multifeature Security through Homomorphic Encryption. 1-17
Secret Sharing
- Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester:
Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. 21-32 - Koji Okada, Kaoru Kurosawa:
Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes. 33-41 - Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
On Sharing Many Secrets (Extended Abstract). 42-54 - Kaoru Kurosawa, Koji Okada:
Combinatorial Interpretation of Secret Sharing Schemes. 55-64
Stream Ciphers
- Miodrag J. Mihaljevic:
A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. 67-79 - Amparo Fúster-Sabater, Pino Caballero-Gil:
On the Linear Complexity of Nonlinear Filtered PN-sequences. 80-90 - Jovan Dj. Golic:
Intrinsic Statistical Weakness of Keystream Generators. 91-103
Cryptographic Functions
- Seongtaek Chee, Sangjin Lee, Kwangjo Kim:
Semi-bent Functions. 107-118 - Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). 119-132
Invited Lecture II
- Catherine A. Meadows:
Formal Verification of Cryptographic Protocols: A Survey. 135-150
Protocols
- Yacov Yacobi:
Efficient Electronic Money (Extended Abstract). 153-163 - Valtteri Niemi, Ari Renvall:
How to Prevent Buying of Votes in Computer Elections. 164-170 - Colin Boyd, Wenbo Mao:
Design and Analysis of Key Exchange Protocols via Secure Channel Identification. 171-181 - Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano:
Zero-Knowledge Proofs of Computational Power in the Shared String Model. 182-192
Invited Lectures III
- Hideki Imai:
Information Security Aspects of Spread Spectrum Systems. 193-208
Authentication and Digital Signatures
- Reihaneh Safavi-Naini, Leonid M. Tombak:
Combinatorial Structure of A-codes with r-fold Security. 211-223 - Patrick Horster, Markus Michels, Holger Petersen:
Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. 224-237 - Mohssen Alabbadi, Stephen B. Wicker:
A Digital Signature Scheme Based on Linear Error-correcting Block Codes. 238-248 - Philippe Béguin, Jean-Jacques Quisquater:
Secure Acceleration of DSS Signatures Using Insecure Server. 249-259
Chryptanalysis
- Derek Atkins, Michael Graff, Arjen K. Lenstra, Paul C. Leyland:
The Magic Words are Squeamish Ossifrage. 263-277 - Eli Biham:
Cryptanalysis of Multiple Modes of Operation. 278-292 - Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui:
Linear Cryptanalysis of LOKI and s2DES. 293-303
Hash Functions
- Jacques Patarin:
Collisions and Inversions for Damgård's Whole Hash Function. 307-321 - Chris Charnes, Josef Pieprzyk:
Attacking the SL2 Hashing Scheme. 322-330
Key Distribution
- Kaoru Kurosawa, Koji Okada, Keiichi Sakano:
Security of the Center in Key Distribution Schemes. 333-341 - Tsutomu Matsumoto:
Incidence Structures for Key Sharing (Extended Abstract). 342-353
Public Key Cryptography
- Peter Smith, Christopher Skinner:
A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms. 357-364 - Masayuki Abe, Hikaru Morita:
Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources. 365-375 - Kaoru Kurosawa, Koji Okada, Shigeo Tsujii:
Low Exponent Attack against Elliptic Curve RSA. 376-383
Block Cipher Algorithms
- Luke O'Connor, Jovan Dj. Golic:
A Unified Markow Approach to Differential and Linear Cryptanalysis. 387-397 - Eli Biham, Alex Biryukov:
How to Strengthen DES Using Existing Hardware. 398-412
Rump Session
- Xingong Chang, Zong-Duo Dai, Guang Gong:
Some Cryptographic Properties of Exponential Functions. 415-418 - Donald Beaver:
Factoring: The DNA Solution. 419-423 - Jacques Stern:
Can One Design a Signature Scheme Based on Error-Correctin Codes? 424-426 - Gary Carter, Andrew J. Clark, Lauren Nielsen:
DESV-1: A Variation of the Data Encryption Standard (DES). 427-430
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.