Cryptographers' World
 

CRYPTO 1992


[Sort by page number] [Sort by citations count]

 
Ernest F. Brickell, editor, Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings. Springer, 1993. ISBN 3-540-57340-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Jurjen N. Bos,  David Chaum,  Provably Unforgeable Signatures, pp. 1 - 14, CRYPTO 1992.

[Electronic Edition][Cited 42 times ]

Eugène van Heijst,  Torben P. Pedersen,  Birgit Pfitzmann,  New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract), pp. 15 - 30, CRYPTO 1992.

[Electronic Edition][Cited 21 times ]

Tatsuaki Okamoto,  Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, pp. 31 - 53, CRYPTO 1992.

[Electronic Edition][Cited 383 times Red StarRed StarRed Star]

Tatsuaki Okamoto,  Atsushi Fujioka,  Eiichiro Fujisaki,  An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Zn, pp. 54 - 65, CRYPTO 1992.

[Electronic Edition][Cited 15 times ]

Daniel M. Gordon,  Designing and Detecting Trapdoors for Discrete Log Cryptosystems, pp. 66 - 75, CRYPTO 1992.

[Electronic Edition][Cited 34 times ]

Miles E. Smid,  Dennis K. Branstad,  Response to Comments of the NIST Proposed Digital Signature Standard, pp. 76 - 88, CRYPTO 1992.

[Electronic Edition][Cited 17 times ]

David Chaum,  Torben P. Pedersen,  Wallet Databases with Observers, pp. 89 - 105, CRYPTO 1992.

[Electronic Edition][Cited 714 times Red StarRed StarRed StarRed Star]

Rafael Hirschfeld,  Making Electronic Refunds Safer, pp. 106 - 112, CRYPTO 1992.

[Electronic Edition][Cited 17 times ]

Silvio Micali,  Fair Public-Key Cryptosystems, pp. 113 - 138, CRYPTO 1992.

[Electronic Edition][Cited 146 times Red StarRed Star]

Cynthia Dwork,  Moni Naor,  Pricing via Processing or Combatting Junk Mail, pp. 139 - 147, CRYPTO 1992.

[Electronic Edition][Cited 417 times Red StarRed StarRed Star]

Carlo Blundo,  Alfredo De Santis,  Luisa Gargano,  Ugo Vaccaro,  On the Information Rate of Secret Sharing Schemes (Extended Abstract), pp. 148 - 167, CRYPTO 1992.

[Electronic Edition][Cited 81 times Red Star]

Douglas R. Stinson,  New General Lower Bounds on the Information Rate of Secret Sharing Schemes, pp. 168 - 182, CRYPTO 1992.

[Electronic Edition][Cited 41 times ]

Amos Beimel,  Benny Chor,  Universally Ideal Secret Sharing Schemes (Preliminary Version), pp. 183 - 195, CRYPTO 1992.

[Electronic Edition][Cited 2 times ]

Moni Naor,  Rafail Ostrovsky,  Ramarathnam Venkatesan,  Moti Yung,  Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract), pp. 196 - 214, CRYPTO 1992.

[Electronic Edition][Cited 12 times ]

Cynthia Dwork,  Uriel Feige,  Joe Kilian,  Moni Naor,  Shmuel Safra,  Low Communication 2-Prover Zero-Knowledge Proofs for NP, pp. 215 - 227, CRYPTO 1992.

[Electronic Edition][Cited 19 times ]

Shafi Goldwasser,  Rafail Ostrovsky,  Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract), pp. 228 - 245, CRYPTO 1992.

[Electronic Edition][Cited 29 times ]

Kouichi Sakurai,  Toshiya Itoh,  On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract), pp. 246 - 259, CRYPTO 1992.

[Electronic Edition][Cited 8 times ]

M. Sivabalan,  Stafford E. Tavares,  Lloyd E. Peppard,  On the Design of SP Networks From an Information Theoretic Point of View, pp. 260 - 279, CRYPTO 1992.

[Electronic Edition][Cited 16 times ]

Claude Carlet,  Partially-Bent Functions, pp. 280 - 291, CRYPTO 1992.

[Electronic Edition][Cited 124 times Red StarRed Star]

Yuliang Zheng,  Jennifer Seberry,  Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract), pp. 292 - 304, CRYPTO 1992.

[Electronic Edition][Cited 52 times Red Star]

Thierry Baritaud,  Mireille Campana,  Pascal Chauvaud,  Henri Gilbert,  On the Security of the Permuted Kernel Identification Scheme, pp. 305 - 311, CRYPTO 1992.

[Electronic Edition][Cited 11 times ]

Daniel M. Gordon,  Kevin S. McCurley,  Massively Parallel Computation of Discrete Logarithms, pp. 312 - 323, CRYPTO 1992.

[Electronic Edition][Cited 55 times Red Star]

RenĂ© Peralta,  A Quadratic Sieve on the n-Dimensional Cube, pp. 324 - 332, CRYPTO 1992.

[Electronic Edition][Cited 10 times ]

Willi Meier,  Othmar Staffelbach,  Efficient Multiplication on Certain Nonsupersingular Elliptic Curves, pp. 333 - 344, CRYPTO 1992.

[Electronic Edition][Cited 73 times Red Star]

Kenji Koyama,  Yukio Tsuruoka,  Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method, pp. 345 - 357, CRYPTO 1992.

[Electronic Edition][Cited 92 times Red Star]

Jørgen Brandt,  Ivan Damgard,  On Generation of Probable Primes By Incremental Search, pp. 358 - 370, CRYPTO 1992.

[Electronic Edition][Cited 21 times ]

Michael R. Fellows,  Neal Koblitz,  Kid Krypto, pp. 371 - 389, CRYPTO 1992.

[Electronic Edition][Cited 9 times ]

Mihir Bellare,  Oded Goldreich,  On Defining Proofs of Knowledge, pp. 390 - 420, CRYPTO 1992.

[Electronic Edition][Cited 257 times Red StarRed StarRed Star]

Amir Herzberg,  Michael Luby,  Public Randomness in Cryptography, pp. 421 - 432, CRYPTO 1992.

[Electronic Edition][Cited 22 times ]

Alexander Russell,  Necessary and Sufficient Conditions For Collision-Free Hashing, pp. 433 - 441, CRYPTO 1992.

[Electronic Edition][Cited 18 times ]

Mihir Bellare,  Moti Yung,  Certifying Cryptographic Tools: The Case of Trapdoor Permutations, pp. 442 - 460, CRYPTO 1992.

[Electronic Edition][Cited 20 times ]

Ueli M. Maurer,  Protocols for Secret Key Agreement by Public Discussion Based on Common Information, pp. 461 - 470, CRYPTO 1992.

[Electronic Edition][Cited 27 times ]

Carlo Blundo,  Alfredo De Santis,  Amir Herzberg,  Shay Kutten,  Ugo Vaccaro,  Moti Yung,  Perfectly-Secure Key Distribution for Dynamic Conferences, pp. 471 - 486, CRYPTO 1992.

[Electronic Edition][Cited 786 times Red StarRed StarRed StarRed Star]

Eli Biham,  Adi Shamir,  Differential Cryptanalysis of the Full 16-Round DES, pp. 487 - 496, CRYPTO 1992.

[Electronic Edition][Cited 285 times Red StarRed StarRed Star]

Lars R. Knudsen,  Iterative Characteristics of DES and s²-DES, pp. 497 - 511, CRYPTO 1992.

[Electronic Edition][Cited 3 times ]

Keith W. Campbell,  Michael J. Wiener,  DES is not a Group, pp. 512 - 520, CRYPTO 1992.

[Electronic Edition][Cited 44 times ]

Hans Eberle,  A High-Speed DES Implementation for Network Applications, pp. 521 - 539, CRYPTO 1992.

[Electronic Edition][Cited 61 times Red Star]

Bob Blakley,  G. R. Blakley,  Agnes Hui Chan,  James L. Massey,  Threshold Schemes with Disenrollment, pp. 540 - 548, CRYPTO 1992.

[Electronic Edition][Cited 69 times Red Star]

Yair Frankel,  Yvo Desmedt,  Mike Burmester,  Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract), pp. 549 - 557, CRYPTO 1992.

[Electronic Edition][Cited 10 times ]

Lein Harn,  Hung-Yu Lin,  An l-Span Generalized Secret Sharing Scheme, pp. 558 - 565, CRYPTO 1992.

[Electronic Edition][Cited 9 times ]

Kaisa Nyberg,  Lars R. Knudsen,  Provable Security Against Differential Cryptanalysis, pp. 566 - 574, CRYPTO 1992.

[Electronic Edition][Cited 146 times Red StarRed Star]

Peter C. Wayner,  Content-Addressable Search Engines and DES-like Systems, pp. 575 - 586, CRYPTO 1992.

[Electronic Edition][Cited 9 times ]

Serge Vaudenay,  FFT-Hash-II is not yet Collision-free, pp. 587 - 593, CRYPTO 1992.

[Electronic Edition][Cited 16 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...