Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jennifer Seberry, Yuliang Zheng 0001 (eds.) |
Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings |
AUSCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Sung Laih, Sung-Ming Yen |
Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Jennifer Seberry |
Practical Proven Secure Authentication with Arbitration. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Cerecedo, Tsutomu Matsumoto, Hideki Imai |
Non-Interactive Generation of Shared Pseudorandom Sequences. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Michael Portz |
A Generalized Description of DES-based and Benes-based Permutationgenerators. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Rudolf Lidl, Winfried B. Müller |
Primality Testing with Lucas Functions. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin B. Nieh, Stafford E. Tavares |
Modelling and Analyzing Cryprographic Protocols Using Petri Nets. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | John Detombe, Stafford E. Tavares |
Constructing Large Cryptographically Strong S-boxes. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Xuejia Lai, Rainer A. Rueppel, Jack Woollven |
A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Kouichi Sakurai, Toshiya Itoh |
Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Miodrag J. Mihaljevic |
An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Jörg Sauerbrey |
A Modular Exponentiation Unit Based on Systolic Arrays. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer Seberry, Xian-Mo Zhang |
Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta |
A Practical Secret Voting Scheme for Large Scale Elections. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Chae Hoon Lim, Pil Joong Lee |
Modified Maurer-Yacobi's scheme and its applications. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Christian Waldvogel, James L. Massey |
The Probability Distribution of the Diffie-Hellman Key. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Chris Charnes, Josef Pieprzyk |
Linear Nonequivalence versus Nonlinearity. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel, René Govaerts, Joos Vandewalle |
An Attack on Two Hash Functions by Zheng-Matsumoto-Imai. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Yuliang Zheng 0001, Josef Pieprzyk, Jennifer Seberry |
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Jean Claude Paillès |
New Protocols for Electronic Money. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Alain P. Hiltgen |
Constructions of Freebly-One-Way Families of Permutations. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Christine M. O'Keefe |
A Comparison of Key Distribution Patterns Constructed from Circle Geometries. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Edward Zuk |
Remarks on "The Design of a Conference Key Distribution System". |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Sung-Ming Yen, Chi-Sung Laih |
The Fast Cascade Exponentation Algorithm and its Applications on Cryptography. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Ed Dawson |
Cryptanalysis of Summation Generator. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Lein Harn, Shoubao Yang |
Public-Key Cryptosystem Based on the Discrete Logarithm Problem. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Valery I. Korzhik, Viktor Yakovlev |
Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk). |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Wen-Ai Jackson, Keith M. Martin |
Cumulative Arrays and Geometric Secret Sharing Schemes. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Atsuko Miyaji |
Elliptic Curves over Fp Suitable for Cryptosystems. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Mike Rezny, Eddie Trimarchi |
A Block Cipher Method using Combinations of Different Methods under the Control of the User Key. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel, René Govaerts, Joos Vandewalle |
On the Power of Memory in the Design of Collision Resistant Hash Functions. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Takashi Satoh, Kaoru Kurosawa, Shigeo Tsujii |
Privacy for Multi-Party Protocols. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen |
On Verifiable Implicit Asking Protocols for RSA Computation. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Leisa Condie |
Prime Generation with the Demytko-Miller-Trbuvich Algorithm. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Lein Harn, Shoubao Yang |
Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Klapper |
The Vulnerability of Geometric Sequences Based on Fields on Odd Characteristic. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Leonid M. Tombak, Reihaneh Safavi-Naini |
Authentication Codes with Perfect Protection. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Jun-Hui Yang, Zong-Duo Dai |
Construction of m-ary de Bruijn Sequences (Extendet abstract). |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Kouichi Sakurai, Toshiya Itoh |
On Bit Correlations Among Preimages of "Many to One" One-Way Functions. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt |
Treshold Cryptosystems (invited talk). |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii |
Nonperfect Secret Sharing Schemes. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Lars R. Knudsen |
Cryptanalysis of LOKI91. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | John Snare |
Information Technology Security Standards - An Australian Perspective. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini, Leonid M. Tombak |
Authentication Codes under Impersonation Attack. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Hardjono, Yuliang Zheng 0001 |
A Practical Digital Multisignature Scheme Based on Discrete Logarithms. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Chin-Chen Chang 0001, Tzong-Chen Wu, C. P. Chen |
The Design of a Conference Key Distribution System. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Michael Bertilsson, Ingemar Ingemarsson |
A Construction of Practical Secret Sharing Schemes using Linear Block Codes. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Shizuya, Kenji Koyama, Toshiya Itoh |
Demonstrating Possession without Revealing Factors and its Application. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Zong-Duo Dai, Kencheng Zeng |
Continued Fractions and the Berlekamp-Massey Algorithm. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Mark Ames |
Secure Cryptographic Initialisation. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Lawrence Brown, Jennifer Seberry |
Key Scheduling In Des Type Cryptosystems. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Yixian Yang |
Dyadic Matrices and Their Potential Significance in Cryptography. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Svein J. Knapskog |
Formal Specification and Verification of Secure Communication Protocols. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Marc Girault |
A (non-practical) three-pass identification protocol using coding theory. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Yixian Yang |
K-M Sequence is Forwardly Predictable. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Jan C. A. van der Lubbe, Dick E. Boekee |
KEYMEX: An expert system for the design of key management schemes. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Michael Newberry |
Minòs: Extended User Authentication. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Willi Geiselmann, Dieter Gollmann |
VLSI Design for Exponentiation in GF (2n). |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kazuo Ohta, Kenji Koyama |
Meet-in-the-Middle Attack on Digital Signature Schemes. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
Authentication, Digital signature, Hash function, One-way function, Meet-in-the-middle attack |
1 | Hikaru Morita |
A Fast Modular-multiplication Module for Smart Cards. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | David Chaum |
Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Pil Joong Lee |
Secure User Access Control for Public Networks. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kencheng Zeng, Minqiang Huang |
Solving Equations in Sequences. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Vangalur S. Alagar |
Range Equations and Range Matrices: a Study in Statistical Database Security. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Guang Gong |
Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Ferreira |
The Practical Application Of State Of The Art Security In Real Environments. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | John M. Carroll 0002 |
The Three Faces of Information Security. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ed Dawson, Bruce Goldburg |
Universal Logic Sequences. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Klaus Gaarder, Einar Snekkenes |
On The Formal Analysis of PKCS Authentication Protocols. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Hardjono |
Record Encryption in Distributed Databases. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
CR Categories E.3, H.2.0, H.3 |
1 | Miodrag J. Mihaljevic, Jovan Dj. Golic |
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Cees J. A. Jansen, Dick E. Boekee |
A Binary Sequence Generator Based on Ziv-Lempel Source Coding. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Rodney H. Cooper, Wayne Patterson |
RSA as a Benchmark for Multiprocessor Machines. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao |
Large Primes in Stream Cipher Cryptography. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Lawrence Brown, Josef Pieprzyk, Jennifer Seberry |
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini |
Parallel Generation of Pseudo-Random Sequences. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Barry Hayes |
Anonymous One-Time Signatures and Flexible Untraceable Electronic Cash. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, Xian-Mo Zhang |
Permutation Generators of Alternating Groups. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Rudolf Lidl, Winfried B. Müller |
A Note on Strong Fibonacci Pseudoprimes. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan |
Network Security Policy Models. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Helen Gustafson, Ed Dawson, William J. Caelli |
Comparison of Block Ciphers. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Cunsheng Ding |
Lower Bounds on the Weight Complexities of Cascaded Binary Sequences. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Alfred Menezes, Scott A. Vanstone |
The Implementation of Elliptic Curve Cryptosystems. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kenji Koyama |
Direct Demonstration of the Power to Break Public-Key Cryptosystems. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild |
Some Remarks on Authentication Systems. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Cees J. A. Jansen, Dick E. Boekee |
On the Significance of the Directed Acyclic Word Graph in Cryptology. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|