Cryptographers' World
 

CRYPTO 1994


[Sort by page number] [Sort by citations count]

 
Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings. Springer, 1994. ISBN 3-540-58333-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Ronald Cramer,  Ivan Damgard,  Berry Schoenmakers,  Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols, pp. 174 - 187, CRYPTO 1994.

[Electronic Edition][Cited 615 times Red StarRed StarRed StarRed Star]

Mihir Bellare,  Joe Kilian,  Phillip Rogaway,  The Security of Cipher Block Chaining, pp. 341 - 358, CRYPTO 1994.

[Electronic Edition][Cited 553 times Red StarRed StarRed StarRed Star]

Benny Chor,  Amos Fiat,  Moni Naor,  Tracing Traitors, pp. 257 - 270, CRYPTO 1994.

[Electronic Edition][Cited 462 times Red StarRed StarRed Star]

Mitsuru Matsui,  The First Experimental Cryptanalysis of the Data Encryption Standard, pp. 1 - 11, CRYPTO 1994.

[Electronic Edition][Cited 268 times Red StarRed StarRed Star]

Chae Hoon Lim,  Pil Joong Lee,  More Flexible Exponentiation with Precomputation, pp. 95 - 107, CRYPTO 1994.

[Electronic Edition][Cited 232 times Red StarRed Star]

Hugo Krawczyk,  LFSR-based Hashing and Authentication, pp. 129 - 139, CRYPTO 1994.

[Electronic Edition][Cited 221 times Red StarRed Star]

Ueli M. Maurer,  Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms, pp. 271 - 281, CRYPTO 1994.

[Electronic Edition][Cited 147 times Red StarRed Star]

Kazue Sako,  Joe Kilian,  Secure Voting Using Partially Compatible Homomorphisms, pp. 411 - 424, CRYPTO 1994.

[Electronic Edition][Cited 133 times Red StarRed Star]

Burton S. Kaliski Jr.,  Matthew J. B. Robshaw,  Linear Cryptanalysis Using Multiple Approximations, pp. 26 - 39, CRYPTO 1994.

[Electronic Edition][Cited 122 times Red StarRed Star]

Mihir Bellare,  Oded Goldreich,  Shafi Goldwasser,  Incremental Cryptography: The Case of Hashing and Signing, pp. 216 - 233, CRYPTO 1994.

[Electronic Edition][Cited 121 times Red StarRed Star]

Cynthia Dwork,  Moni Naor,  An Efficient Existentially Unforgeable Signature Scheme and its Applications, pp. 234 - 246, CRYPTO 1994.

[Electronic Edition][Cited 100 times Red StarRed Star]

Ran Canetti,  Amir Herzberg,  Maintaining Security in the Presence of Transient Faults, pp. 425 - 438, CRYPTO 1994.

[Electronic Edition][Cited 96 times Red Star]

Tatsuaki Okamoto,  Designated Confirmer Signatures and Public-Key Encryption are Equivalent, pp. 61 - 74, CRYPTO 1994.

[Electronic Edition][Cited 90 times Red Star]

Susan K. Langford,  Martin E. Hellman,  Differential-Linear Cryptanalysis, pp. 17 - 25, CRYPTO 1994.

[Electronic Edition][Cited 86 times Red Star]

Mike Burmester,  On the Risk of Opening Distributed Keys, pp. 308 - 317, CRYPTO 1994.

[Electronic Edition][Cited 71 times Red Star]

Don Davis,  Ross Ihaka,  Philip Fenstermacher,  Cryptographic Randomness from Air Turbulence in Disk Drives, pp. 114 - 120, CRYPTO 1994.

[Electronic Edition][Cited 55 times Red Star]

Marc Girault,  Jacques Stern,  On the Length of Cryptographic Hash-Values Used in Identification Schemes, pp. 202 - 215, CRYPTO 1994.

[Electronic Edition][Cited 52 times Red Star]

Daniel Bleichenbacher,  Ueli M. Maurer,  Directed Acyclic Graphs, One-way Functions and Digital Signatures, pp. 75 - 82, CRYPTO 1994.

[Electronic Edition][Cited 48 times ]

Jacques Stern,  Designing Identification Schemes with Keys of Short Size, pp. 164 - 173, CRYPTO 1994.

[Electronic Edition][Cited 45 times ]

J√ľrgen Bierbrauer,  K. Gopalakrishnan,  Douglas R. Stinson,  Bounds for Resilient Functions and Orthogonal Arrays, pp. 247 - 256, CRYPTO 1994.

[Electronic Edition][Cited 44 times ]

Jean-Pierre Tillich,  Gilles Z√©mor,  Hashing with SL2, pp. 40 - 49, CRYPTO 1994.

[Electronic Edition][Cited 41 times ]

Carlo Blundo,  Alfredo De Santis,  Giovanni Di Crescenzo,  Antonio Giorgio Gaggia,  Ugo Vaccaro,  Multi-Secret Sharing Schemes, pp. 150 - 163, CRYPTO 1994.

[Electronic Edition][Cited 37 times ]

James L. Massey,  Shirlei Serconek,  A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences, pp. 332 - 340, CRYPTO 1994.

[Electronic Edition][Cited 37 times ]

Jinhui Chao,  Kazuo Tanada,  Shigeo Tsujii,  Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks, pp. 50 - 55, CRYPTO 1994.

[Electronic Edition][Cited 28 times ]

Thomas Beth,  Dejan E. Lazic,  A. Mathias,  Cryptanalysis of Cryptosystems Based on Remote Chaos Replication, pp. 318 - 331, CRYPTO 1994.

[Electronic Edition][Cited 27 times ]

Kaoru Kurosawa,  New Bound on Authentication Code with Arbitration, pp. 140 - 149, CRYPTO 1994.

[Electronic Edition][Cited 21 times ]

Eyal Kushilevitz,  Adi Ros√©n,  A Randomness-Rounds Tradeoff in Private Computation, pp. 397 - 410, CRYPTO 1994.

[Electronic Edition][Cited 19 times ]

Kazuo Ohta,  Kazumaro Aoki,  Linear Cryptanalysis of the Fast Data Encipherment Algorithm, pp. 12 - 16, CRYPTO 1994.

[Electronic Edition][Cited 15 times ]

Henri Gilbert,  Pascal Chauvaud,  A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem, pp. 359 - 368, CRYPTO 1994.

[Electronic Edition][Cited 15 times ]

Preda Mihailescu,  Fast Generation of Provable Primes Using Search in Arithmetic Progressions, pp. 282 - 293, CRYPTO 1994.

[Electronic Edition][Cited 14 times ]

Jennifer Seberry,  Xian-Mo Zhang,  Yuliang Zheng,  Pitfalls in Designing Substitution Boxes (Extended Abstract), pp. 383 - 396, CRYPTO 1994.

[Electronic Edition][Cited 13 times ]

Ingrid Biehl,  Johannes Buchmann,  Christoph Thiel,  Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders, pp. 56 - 60, CRYPTO 1994.

[Electronic Edition][Cited 12 times ]

Don Coppersmith,  Attack on the Cryptographic Scheme NIKS-TAS, pp. 294 - 307, CRYPTO 1994.

[Electronic Edition][Cited 10 times ]

Olivier Delos,  Jean-Jacques Quisquater,  An Identity-Based Signature Scheme with Bounded Life-Span, pp. 83 - 94, CRYPTO 1994.

[Electronic Edition][Cited 6 times ]

Christian Gehrmann,  Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol, pp. 121 - 128, CRYPTO 1994.

[Electronic Edition][Cited 6 times ]

Tam√°s Horv√°th,  Spyros S. Magliveras,  Tran van Trung,  A Parallel Permutation Multiplier for a PGM Crypto-chip, pp. 108 - 113, CRYPTO 1994.

[Electronic Edition][Cited 2 times ]

Toshiya Itoh,  Yuji Ohta,  Hiroki Shizuya,  Language Dependent Secure Bit Commitment, pp. 188 - 201, CRYPTO 1994.

[Electronic Edition][Cited 1 times ]

Yukiyasu Tsunoo,  Eiji Okamoto,  Tomohiko Uyematsu,  Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext, pp. 369 - 382, CRYPTO 1994.

[Electronic Edition][Cited 1 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...