Cryptographers' World
 

ASIACRYPT 1996


[Sort by page number] [Sort by citations count]

 
Kwangjo KimTsutomu Matsumoto, editors, Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings. Springer, 1996. ISBN 3-540-61872-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Atsuko Miyaji,  A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves, pp. 1 - 14, ASIACRYPT 1996.

[Electronic Edition][Cited 17 times ]

Ingrid Biehl,  Bernd Meyer,  Christoph Thiel,  Cryptographic Protocols Based on Real-Quadratic A-fields, pp. 15 - 25, ASIACRYPT 1996.

[Electronic Edition][Cited 8 times ]

Ross J. Anderson,  Serge Vaudenay,  Minding your p's and q`s, pp. 26 - 35, ASIACRYPT 1996.

[Electronic Edition][Cited 52 times Red Star]

Mike Just,  Serge Vaudenay,  Authenticated Multi-Party Key Agreement, pp. 36 - 49, ASIACRYPT 1996.

[Electronic Edition][Cited 161 times Red StarRed Star]

Kevin S. McCurley,  Cryptography and the Internet: Lessons and Challenges, pp. 50 - 56, ASIACRYPT 1996.

[Electronic Edition][Cited 3 times ]

Arjen K. Lenstra,  Generating Standard DSA Signatures Without Long Inversion, pp. 57 - 64, ASIACRYPT 1996.

[Electronic Edition][Cited 3 times ]

Erik De Win,  Antoon Bosselaers,  Servaas Vandenberghe,  Peter De Gersem,  Joos Vandewalle,  A Fast Software Implementation for Arithmetic Operations in GF(2, pp. 65 - 76, ASIACRYPT 1996.

[Electronic Edition][Cited 131 times Red StarRed Star]

Lars R. Knudsen,  Bart Preneel,  Hash Functions Based on Block Ciphers and Quaternary Codes, pp. 77 - 90, ASIACRYPT 1996.

[Electronic Edition][Cited 23 times ]

Kaisa Nyberg,  Generalized Feistel Networks, pp. 91 - 104, ASIACRYPT 1996.

[Electronic Edition][Cited 39 times ]

Philip Hawkes,  Luke O'Connor,  On Applying Linear Cryptanalysis to IDEA, pp. 105 - 115, ASIACRYPT 1996.

[Electronic Edition][Cited 16 times ]

Chun-I Fan,  Chin-Laung Lei,  A Multi-Recastable Ticket Scheme for Electronic Elections, pp. 116 - 124, ASIACRYPT 1996.

[Electronic Edition][Cited 25 times ]

Markus Michels,  Patrick Horster,  Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme, pp. 125 - 132, ASIACRYPT 1996.

[Electronic Edition][Cited 76 times Red Star]

Jianying Zhou,  Dieter Gollmann,  Observations on Non-repudiation, pp. 133 - 144, ASIACRYPT 1996.

[Electronic Edition][Cited 65 times Red Star]

Daniel Bleichenbacher,  Ueli M. Maurer,  On the Efficiency of One-Time Digital Signatures, pp. 145 - 158, ASIACRYPT 1996.

[Electronic Edition][Cited 49 times ]

Kouichi Sakurai,  A Hidden Cryptographic Assumption in No-Transferable Identification Schemes, pp. 159 - 172, ASIACRYPT 1996.

[Electronic Edition][Cited 1 times ]

Shigeo Tsujii,  Electronic Money and Key Management from Global and Regional Points of View, pp. 173 - 184, ASIACRYPT 1996.

[Electronic Edition][No citation]

Kazukuni Kobara,  Hideki Imai,  Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification, pp. 185 - 195, ASIACRYPT 1996.

[Electronic Edition][Cited 19 times ]

Ueli M. Maurer,  Stefan Wolf,  Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible, pp. 196 - 209, ASIACRYPT 1996.

[Electronic Edition][Cited 15 times ]

Valeri Korjik,  D. Kushnir,  Key Sharing Based on the Wire-Tap Channel Type II Concept with Noisy Main Channel, pp. 210 - 217, ASIACRYPT 1996.

[Electronic Edition][Cited 1 times ]

Kaoru Kurosawa,  Takashi Satoh,  Generalization of Higher Order SAC to Vector Output Boolean Functions, pp. 218 - 231, ASIACRYPT 1996.

[Electronic Edition][Cited 9 times ]

Seongtaek Chee,  Sangjin Lee,  Daiki Lee,  Soo Hak Sung,  On the Correlation Immune Functions and Their Nonlinearity, pp. 232 - 243, ASIACRYPT 1996.

[Electronic Edition][Cited 43 times ]

Masayuki Abe,  Eiichiro Fujisaki,  How to Date Blind Signatures, pp. 244 - 251, ASIACRYPT 1996.

[Electronic Edition][Cited 208 times Red StarRed Star]

David Pointcheval,  Jacques Stern,  Provably Secure Blind Signature Schemes, pp. 252 - 265, ASIACRYPT 1996.

[Electronic Edition][Cited 176 times Red StarRed Star]

David M'Ra├»hi,  Cost-Effective Payment Schemes with Privacy Regulation, pp. 266 - 275, ASIACRYPT 1996.

[Electronic Edition][Cited 22 times ]

Agnes Hui Chan,  Yair Frankel,  Philip D. MacKenzie,  Yiannis Tsiounis,  Mis-representation of Identities in E-cash Schemes and how to Prevent it, pp. 276 - 285, ASIACRYPT 1996.

[Electronic Edition][Cited 16 times ]

Yair Frankel,  Yiannis Tsiounis,  Moti Yung,  "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash, pp. 286 - 300, ASIACRYPT 1996.

[Electronic Edition][Cited 164 times Red StarRed Star]

Jacques Stern,  The Validation of Cryptographic Algorithms, pp. 301 - 310, ASIACRYPT 1996.

[Electronic Edition][Cited 9 times ]

Seungjoo Kim,  Sung Jun Park,  Dongho Won,  Convertible Group Signatures, pp. 311 - 321, ASIACRYPT 1996.

[Electronic Edition][Cited 42 times ]

Masahiro Mambo,  Kouichi Sakurai,  Eiji Okamoto,  How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem, pp. 322 - 333, ASIACRYPT 1996.

[Electronic Edition][Cited 6 times ]

Markus Michels,  Patrick Horster,  On the Risk of Disruption in Several Multiparty Signature Schemes, pp. 334 - 345, ASIACRYPT 1996.

[Electronic Edition][Cited 70 times Red Star]

Willi Geiselmann,  Dieter Gollmann,  Correlation Attacks on Cascades of Clock Controlled Shift Registers, pp. 346 - 359, ASIACRYPT 1996.

[Electronic Edition][Cited 2 times ]

Sangjin Lee,  Seongtaek Chee,  Sangjoon Park,  Sung-Mo Park,  Conditional Correlation Attack on Nonlinear Filter Generators, pp. 360 - 367, ASIACRYPT 1996.

[Electronic Edition][Cited 16 times ]

Florent Chabaud,  Jacques Stern,  The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes, pp. 368 - 381, ASIACRYPT 1996.

[Electronic Edition][Cited 15 times ]

James Cowie,  Bruce Dodson,  R. Marije Elkenbracht-Huizing,  Arjen K. Lenstra,  Peter L. Montgomery,  J├Ârg Zayer,  A World Wide Number Field Sieve Factoring Record: On to 512 Bits, pp. 382 - 394, ASIACRYPT 1996.

[Electronic Edition][Cited 95 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...