Cryptographers' World
 

CRYPTO 1995


[Sort by page number] [Sort by citations count]

 
Don Coppersmith, editor, Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings. Springer, 1995. ISBN 3-540-60221-6.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Bart Preneel,  Paul C. van Oorschot,  MDx-MAC and Building Fast MACs from Hash Functions, pp. 1 - 14, CRYPTO 1995.

[Electronic Edition][Cited 160 times Red StarRed Star]

Mihir Bellare,  Roch GuĂ©rin,  Phillip Rogaway,  XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions, pp. 15 - 28, CRYPTO 1995.

[Electronic Edition][Cited 186 times Red StarRed Star]

Phillip Rogaway,  Bucket Hashing and its Application to Fast Message Authentication, pp. 29 - 42, CRYPTO 1995.

[Electronic Edition][Cited 81 times Red Star]

Richard Schroeppel,  Hilarie K. Orman,  Sean W. O'Malley,  Oliver Spatscheck,  Fast Key Exchange with Elliptic Curve Systems, pp. 43 - 56, CRYPTO 1995.

[Electronic Edition][Cited 215 times Red StarRed Star]

Philippe BĂ©guin,  Jean-Jacques Quisquater,  Fast Server-Aided RSA Signatures Secure Against Active Attacks, pp. 57 - 69, CRYPTO 1995.

[Electronic Edition][Cited 37 times ]

Chae Hoon Lim,  Pil Joong Lee,  Security and Performance of Server-Aided RSA Computation Protocols, pp. 70 - 83, CRYPTO 1995.

[Electronic Edition][Cited 47 times ]

Shai Halevi,  Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver, pp. 84 - 96, CRYPTO 1995.

[Electronic Edition][Cited 15 times ]

Donald Beaver,  Precomputing Oblivious Transfer, pp. 97 - 109, CRYPTO 1995.

[Electronic Edition][Cited 41 times ]

Claude CrĂ©peau,  Jeroen van de Graaf,  Alain Tapp,  Committed Oblivious Transfer and Private Multi-Party Computation, pp. 110 - 123, CRYPTO 1995.

[Electronic Edition][Cited 102 times Red StarRed Star]

Dominic Mayers,  On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols, pp. 124 - 135, CRYPTO 1995.

[Electronic Edition][Cited 23 times ]

Thorsten Theobald,  How to Break Shamir's Asymmetric Basis, pp. 136 - 147, CRYPTO 1995.

[Electronic Edition][Cited 8 times ]

Sangjoon Park,  Sangjin Lee,  Seung-Cheol Goh,  On the Security of the Gollmann Cascades, pp. 148 - 156, CRYPTO 1995.

[Electronic Edition][Cited 9 times ]

Kazuo Ohta,  Shiho Moriai,  Kazumaro Aoki,  Improving the Search Algorithm for the Best Linear Expression, pp. 157 - 170, CRYPTO 1995.

[Electronic Edition][Cited 10 times ]

Burton S. Kaliski Jr.,  Yiqun Lisa Yin,  On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm, pp. 171 - 184, CRYPTO 1995.

[Electronic Edition][Cited 71 times Red Star]

Silvio Micali,  Ray Sidney,  A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems, pp. 185 - 196, CRYPTO 1995.

[Electronic Edition][Cited 5 times ]

Arjen K. Lenstra,  Peter Winkler,  Yacov Yacobi,  A Key Escrow System with Warrant Bounds, pp. 197 - 207, CRYPTO 1995.

[Electronic Edition][Cited 42 times ]

Joe Kilian,  Frank Thomson Leighton,  Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract), pp. 208 - 221, CRYPTO 1995.

[Electronic Edition][Cited 63 times Red Star]

Yair Frankel,  Moti Yung,  Escrow Encryption Systems Visited: Attacks, Analysis and Designs, pp. 222 - 235, CRYPTO 1995.

[Electronic Edition][Cited 64 times Red Star]

Ross J. Anderson,  Roger M. Needham,  Robustness Principles for Public Key Protocols, pp. 236 - 247, CRYPTO 1995.

[Electronic Edition][Cited 214 times Red StarRed Star]

Jacques Patarin,  Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88, pp. 248 - 261, CRYPTO 1995.

[Electronic Edition][Cited 189 times Red StarRed Star]

Andrew Klapper,  Mark Goresky,  Cryptanalysis Based on 2-Adic Rational Approximation, pp. 262 - 273, CRYPTO 1995.

[Electronic Edition][Cited 39 times ]

Lars R. Knudsen,  A Key-schedule Weakness in SAFER K-64, pp. 274 - 286, CRYPTO 1995.

[Electronic Edition][Cited 48 times ]

Yair Frankel,  Moti Yung,  Cryptanalysis of the Immunized LL Public Key Systems, pp. 287 - 296, CRYPTO 1995.

[Electronic Edition][Cited 15 times ]

Ronald Cramer,  Ivan Damgard,  Secure Signature Schemes based on Interactive Protocols, pp. 297 - 310, CRYPTO 1995.

[Electronic Edition][Cited 36 times ]

Joe Kilian,  Improved Efficient Arguments (Preliminary Version), pp. 311 - 324, CRYPTO 1995.

[Electronic Edition][Cited 23 times ]

Ivan Damgard,  Oded Goldreich,  Tatsuaki Okamoto,  Avi Wigderson,  Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs, pp. 325 - 338, CRYPTO 1995.

[Electronic Edition][Cited 30 times ]

Amir Herzberg,  Stanislaw Jarecki,  Hugo Krawczyk,  Moti Yung,  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage, pp. 339 - 352, CRYPTO 1995.

[Electronic Edition][Cited 480 times Red StarRed StarRed Star]

Amos Beimel,  Benny Chor,  Secret Sharing with Public Reconstruction (Extended Abstract), pp. 353 - 366, CRYPTO 1995.

[Electronic Edition][Cited 37 times ]

G. R. Blakley,  Gregory Kabatianskii,  On General Perfect Secret Sharing Schemes, pp. 367 - 371, CRYPTO 1995.

[Electronic Edition][Cited 7 times ]

Bruce Dodson,  Arjen K. Lenstra,  NFS with Four Large Primes: An Explosive Experiment, pp. 372 - 385, CRYPTO 1995.

[Electronic Edition][Cited 42 times ]

Daniel Bleichenbacher,  Wieb Bosma,  Arjen K. Lenstra,  Some Remarks on Lucas-Based Cryptosystems, pp. 386 - 396, CRYPTO 1995.

[Electronic Edition][Cited 51 times Red Star]

Susan K. Langford,  Threshold DSS Signatures without a Trusted Party, pp. 397 - 409, CRYPTO 1995.

[Electronic Edition][Cited 60 times Red Star]

Kaoru Kurosawa,  Satoshi Obana,  Wakaha Ogata,  t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes, pp. 410 - 423, CRYPTO 1995.

[Electronic Edition][Cited 16 times ]

Dan Boneh,  Richard J. Lipton,  Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract), pp. 424 - 437, CRYPTO 1995.

[Electronic Edition][Cited 91 times Red Star]

Tatsuaki Okamoto,  An Efficient Divisible Electronic Cash Scheme, pp. 438 - 451, CRYPTO 1995.

[Electronic Edition][Cited 170 times Red StarRed Star]

Dan Boneh,  James Shaw,  Collusion-Secure Fingerprinting for Digital Data (Extended Abstract), pp. 452 - 465, CRYPTO 1995.

[Electronic Edition][Cited 597 times Red StarRed StarRed StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...