Cryptographers' World
 

ASIACRYPT 1991


[Sort by page number] [Sort by citations count]

 
Hideki ImaiRonald L. RivestTsutomu Matsumoto, editors, Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings. Springer, 1993. ISBN 3-540-57332-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Donald W. Davies,  The Transition from Mechanisms to Electronic Computers, 1940 to 1950, pp. 1 - 21, ASIACRYPT 1991.

[Electronic Edition][No citation]

Lars R. Knudsen,  Cryptanalysis of LOKI, pp. 22 - 35, ASIACRYPT 1991.

[Electronic Edition][Cited 35 times ]

Lawrence Brown,  Matthew Kwan,  Josef Pieprzyk,  Jennifer Seberry,  Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI, pp. 36 - 50, ASIACRYPT 1991.

[Electronic Edition][Cited 73 times Red Star]

Hiroshi Miyano,  A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis, pp. 51 - 58, ASIACRYPT 1991.

[Electronic Edition][Cited 3 times ]

Kwangjo Kim,  Construction of DES-like S-boxes Based on Boolean Functions Satisfying the SAC, pp. 59 - 72, ASIACRYPT 1991.

[Electronic Edition][Cited 19 times ]

Jun-Hui Yang,  Zong-Duo Dai,  Kencheng Zeng,  The Data Base of Selected Permutations (Extended Abstract), pp. 73 - 81, ASIACRYPT 1991.

[Electronic Edition][No citation]

Joan Daemen,  Ren√© Govaerts,  Joos Vandewalle,  A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damg√•rd's One-Way Function Based on a Cellular Automaton, pp. 82 - 96, ASIACRYPT 1991.

[Electronic Edition][Cited 34 times ]

Babak Sadeghiyan,  Yuliang Zheng,  Josef Pieprzyk,  How to Construct A Family of Strong One Way Permutations, pp. 97 - 110, ASIACRYPT 1991.

[Electronic Edition][Cited 4 times ]

Wakaha Ogata,  Kaoru Kurosawa,  On Claw Free Families, pp. 111 - 123, ASIACRYPT 1991.

[Electronic Edition][Cited 6 times ]

Yuliang Zheng,  Thomas Hardjono,  Josef Pieprzyk,  Sibling Intractable Function Families and Their Applications (Extended Abstract), pp. 124 - 138, ASIACRYPT 1991.

[Electronic Edition][Cited 15 times ]

Kazuo Ohta,  Tatsuaki Okamoto,  A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme, pp. 139 - 148, ASIACRYPT 1991.

[Electronic Edition][Cited 104 times Red StarRed Star]

Hung-Yu Lin,  Lein Harn,  A Generalized Secret Sharing Scheme With Cheater Detection, pp. 149 - 158, ASIACRYPT 1991.

[Electronic Edition][Cited 33 times ]

Chi-Sung Laih,  Lein Harn,  Generalized Threshold Cryptosystems, pp. 159 - 166, ASIACRYPT 1991.

[Electronic Edition][Cited 41 times ]

Reihaneh Safavi-Naini,  Feistel Type Authentication Codes, pp. 170 - 178, ASIACRYPT 1991.

[Electronic Edition][Cited 1 times ]

Man Y. Rhee,  Research Activities on Cryptology in Korea, pp. 179 - 193, ASIACRYPT 1991.

[Electronic Edition][Cited 1 times ]

Babak Sadeghiyan,  Josef Pieprzyk,  On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations, pp. 194 - 209, ASIACRYPT 1991.

[Electronic Edition][Cited 19 times ]

Shimon Even,  Yishay Mansour,  A Construction of a Cipher From a Single Pseudorandom Permutation, pp. 210 - 224, ASIACRYPT 1991.

[Electronic Edition][Cited 82 times Red Star]

Josef Pieprzyk,  Babak Sadeghiyan,  Optimal Perfect Randomizers, pp. 225 - 236, ASIACRYPT 1991.

[Electronic Edition][Cited 6 times ]

Matthew Kwan,  Josef Pieprzyk,  A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract), pp. 237 - 246, ASIACRYPT 1991.

[Electronic Edition][No citation]

Hikaru Morita,  Kazuo Ohta,  Shoji Miyaguchi,  Results of Switching-Closure-Test on FEAL (Extended Abstract), pp. 247 - 252, ASIACRYPT 1991.

[Electronic Edition][No citation]

Jun-ichi Mizusawa,  IC-Cards and Telecommunication Services, pp. 253 - 264, ASIACRYPT 1991.

[Electronic Edition][No citation]

Atsushi Shimbo,  Shin-ichi Kawamura,  Cryptanalysis of Several Conference Key Distribution Schemes, pp. 265 - 276, ASIACRYPT 1991.

[Electronic Edition][Cited 22 times ]

Andrew Klapper,  Mark Goresky,  Revealing Information with Partial Period Correlations (Extended Abstract), pp. 277 - 287, ASIACRYPT 1991.

[Electronic Edition][No citation]

Joost Meijers,  Johan van Tilburg,  Extended Majority Voting and Private-Key Algebraic-Code Encryptions, pp. 288 - 298, ASIACRYPT 1991.

[Electronic Edition][Cited 1 times ]

Bruce Goldburg,  Ed Dawson,  S. Sridharan,  A Secure Analog Speech Scrambler Using the Discrete Cosine Transform, pp. 299 - 311, ASIACRYPT 1991.

[Electronic Edition][No citation]

Lein Harn,  Hung-Yu Lin,  An Oblivious Transfer Protocol and Its Application for the Exchange of Secrets, pp. 312 - 320, ASIACRYPT 1991.

[Electronic Edition][Cited 9 times ]

Takeshi Saito,  Kaoru Kurosawa,  Kouichi Sakurai,  4 Move Perfect ZKIP of Knowledge with No Assumption, pp. 321 - 330, ASIACRYPT 1991.

[Electronic Edition][Cited 6 times ]

Toshiya Itoh,  Kouichi Sakurai,  On the Complexity of Constant Round ZKIP of Possession of Knowledge, pp. 331 - 345, ASIACRYPT 1991.

[Electronic Edition][Cited 13 times ]

Lance Fortnow,  Mario Szegedy,  On the Power of Two-Local Random Reductions, pp. 346 - 351, ASIACRYPT 1991.

[Electronic Edition][Cited 8 times ]

Joan Feigenbaum,  Rafail Ostrovsky,  A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems, pp. 352 - 359, ASIACRYPT 1991.

[Electronic Edition][Cited 2 times ]

Yvo Desmedt,  Mike Burmester,  An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers, pp. 360 - 367, ASIACRYPT 1991.

[Electronic Edition][Cited 5 times ]

Tatsuaki Okamoto,  An Extension of Zero-Knowledge Proofs and Its Applications, pp. 368 - 381, ASIACRYPT 1991.

[Electronic Edition][Cited 2 times ]

Toshiya Itoh,  Kouichi Sakurai,  Hiroki Shizuya,  Any Language in IP Has a Divertible ZKIP, pp. 382 - 396, ASIACRYPT 1991.

[Electronic Edition][Cited 11 times ]

Chaosheng Shu,  Tsutomu Matsumoto,  Hideki Imai,  A Multi-Purpose Proof System - for Identity and Membership Proofs, pp. 397 - 411, ASIACRYPT 1991.

[Electronic Edition][No citation]

Marie-Jeanne Toussaint,  Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract), pp. 412 - 426, ASIACRYPT 1991.

[Electronic Edition][Cited 7 times ]

Ronald L. Rivest,  Cryptography and Machine Learning, pp. 427 - 439, ASIACRYPT 1991.

[Electronic Edition][Cited 12 times ]

J√łrgen Brandt,  Ivan Damgard,  Peter Landrock,  Speeding up Prime Number Generation, pp. 440 - 449, ASIACRYPT 1991.

[Electronic Edition][Cited 15 times ]

Chi-Sung Laih,  Sung-Ming Yen,  Lein Harn,  Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence, pp. 450 - 459, ASIACRYPT 1991.

[Electronic Edition][Cited 11 times ]

Atsuko Miyaji,  On Ordinary Elliptic Curve Cryptosystems, pp. 460 - 469, ASIACRYPT 1991.

[Electronic Edition][Cited 22 times ]

Antoine Joux,  Jacques Stern,  Cryptanalysis of Another Knapsack Cryptosystem, pp. 470 - 476, ASIACRYPT 1991.

[Electronic Edition][Cited 13 times ]

Joan Daemen,  Antoon Bosselaers,  Ren√© Govaerts,  Joos Vandewalle,  Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91, pp. 477 - 480, ASIACRYPT 1991.

[Electronic Edition][Cited 9 times ]

Ronald L. Rivest,  On NIST's Proposed Digital Signature Standard, pp. 481 - 484, ASIACRYPT 1991.

[Electronic Edition][Cited 2 times ]

Toshinobu Kaneko,  A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference, pp. 485 - 488, ASIACRYPT 1991.

[Electronic Edition][Cited 2 times ]

Matthew Kwan,  Simultaneous Attacks in Differential Cryptanalysis (Getting More Pairs Per Encryption), pp. 489 - 492, ASIACRYPT 1991.

[Electronic Edition][Cited 1 times ]

Stig Fr. Mj√łlsnes,  Privacy, Cryptographic Pseudonyms, and The State of Health, pp. 493 - 494, ASIACRYPT 1991.

[Electronic Edition][Cited 2 times ]

Joan Daemen,  Limitations of the Even-Mansour Construction, pp. 495 - 498, ASIACRYPT 1991.

[Electronic Edition][Cited 29 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...