


default search action
EUROCRYPT 1990: Aarhus, Denmark
- Ivan Damgård: 
 Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings. Lecture Notes in Computer Science 473, Springer 1991, ISBN 3-540-53587-X
Protocols
- Mike Burmester: 
 Yvo Desmedt: All Languages in NP Have Divertible Zero-Knowledge Proofs and Arguments Under Cryptographic Assumptions. 1-10
- George I. Davida, Yvo Desmedt, René Peralta  : :
 On the Importance of Memory Resources in the Security of Key Exchange Protocols. 11-15
- Shinji Shinozaki, Toshiya Itoh, Atsushi Fujioka, Shigeo Tsujii: 
 Provably Secure Key-Updating Schemes in Identity-Based Systems. 16-30
- Bert den Boer: 
 Oblivous Transfer Protecting Secrecy. 31-45
- Alfredo De Santis  , Giuseppe Persiano: , Giuseppe Persiano:
 Public-Randomness in Public Key Cryptography. 46-62
- Ernest F. Brickell, Kevin S. McCurley  : :
 An Interactive Identification Scheme Based on Discrete Logarithms and Factoring. 63-71
Number-Theoretic Algorithms
- Arjen K. Lenstra, Mark S. Manasse: 
 Factoring With Two Large Primes. 72-82
- Jan-Hendrik Evertse, Eugène van Heyst: 
 Which New RSA Signatures Can Be Computed From Some Given RSA Signatures? 83-97
- Renate Scheidler  , Johannes Buchmann, Hugh C. Williams: , Johannes Buchmann, Hugh C. Williams:
 Implementation of a Key Exchange Protocol Using Some Real Quadratic Fields. 98-109
- François Morain: 
 Distributed Primality Proving and the Primality of (23539+1)/3. 110-123
Boolean Functions
- Sheelagh Lloyd: 
 Properties of Binary Functions. 124-139
- Josef Pieprzyk  : :
 How to Construct Pseudorandom Permutations from Single Pseudorandom Functions. 140-150
- Kaisa Nyberg: 
 Constructions of Bent Functions and Difference Sets. 151-160
- Bart Preneel, Werner Van Leekwijck, Luc Van Linden, René Govaerts, Joos Vandewalle: 
 Propagation Characteristics of Boolean Functions. 161-173
Binary Sequences
- Harald Niederreiter: 
 The Linear Complexity Profile and the Jump Complexity of Keystream Sequences. 174-188
- Zong-Duo Dai, Thomas Beth, Dieter Gollmann: 
 Lower Bounds for the Linear Complexity of Sequences over Residue Rings. 189-195
- Cees J. A. Jansen: 
 On the Construction of Run Permuted Sequences. 196-203
- Willi Meier, Othmar Staffelbach: 
 Correlation Properties of Combiners with Memory in Stream Ciphers. 204-213
- Agnes Hui Chan, Mark Goresky, Andrew Klapper: 
 Correlation Functions of Geometric Sequences. 214-221
Implementations
- Yacov Yacobi: 
 Exponentiating Faster with Addition Chains. 222-229
- Stephen R. Dussé, Burton S. Kaliski Jr.: 
 A Cryptographic Library for the Motorola DSP56000. 230-244
- Holger Orup, Erik Svendsen, Erik Andreasen: 
 VICTOR an Efficient RSA Hardware Implementation. 245-252
- Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin: 
 Experimental Quantum Cryptography. 253-265
Combinatorial Schemes
- Ingemar Ingemarsson, Gustavus J. Simmons: 
 A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party. 266-282
- Andrea Sgarro: 
 Lower Bounds for Authentication Codes With Splitting. 283-293
- Albrecht Beutelspacher, Ute Rosenbaum: 
 Essentially l-Fold Secure Authentication Systems. 294-305
- Ben J. M. Smeets, Peter Vanroose, Zhe-xian Wan: 
 On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2. 306-312
Cryptanalysis
- Jacques Stern, Philippe Toffin: 
 Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers. 313-317
- Paul C. van Oorschot, Michael J. Wiener: 
 A Known Plaintext Attack on Two-Key Triple Encryption. 318-325
- Shoji Miyaguchi, Kazuo Ohta, Masahiko Iwata: 
 Confirmation that Some Hash Functions Are Not Collision Free. 326-343
- Fritz Bauspieß, Hans-Joachim Knobloch, Peer Wichmann: 
 Inverting the Pseudo Exponentiation. 344-351
New Cryptosystems
- Tzonelih Hwang: 
 Cryptosystem for Group Oriented Cryptography. 352-360
- Ueli M. Maurer: 
 A Provably-Secure Strongly-Randomized Cipher. 361-373
- Kaoru Kurosawa, Yutaka Katayama, Wakaha Ogata  , Shigeo Tsujii: , Shigeo Tsujii:
 General Public Key Residue Cryptosystems and Mental Poker Protocols. 374-388
- Xuejia Lai, James L. Massey: 
 A Proposal for a New Block Encryption Standard. 389-404
- Valtteri Niemi: 
 A New Trapdoor in Knapsacks. 405-411
Signatures and Authentication
- Alfredo De Santis  , Moti Yung: , Moti Yung:
 On the Design of Provably Secure Cryptographic Hash Functions. 412-431
- H. Ong, Claus-Peter Schnorr: 
 Fast Signature Generation With a Fiat Shamir-Like Scheme. 432-440
- Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner  : :
 A Remark on a Signature Scheme Where Forgery Can Be Proved. 441-445
- Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama: 
 Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme. 446-457
- David Chaum: 
 Zero-Knowledge Undeniable Signatures. 458-464
- Louis C. Guillou, Jean-Jacques Quisquater, Michael Walker, Peter Landrock, Caroline Shafer: 
 Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". 465-473
Rump Session: Impromptu Talks
- Josep Domingo-Ferrer: 
 Software Run-Time Protection: A Cryptographic Issue. 474-480
- Marc Girault: 
 An Identity-based Identification Scheme Based on Discrete Logarithms Modulo a Composite Number. 481-486
- Jovan Dj. Golic, Miodrag J. Mihaljevic: 
 A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach. 487-491
- Burton S. Kaliski Jr.: 
 The MD4 Message Digest Algorithm (Abstract). 492
- Mike Burmester: 
 A Remark on the Efficiency of Identification Schemes. 493-495
- Gisela Meister: 
 On an Implementation of the Mohan-Adiga Algorithm. 496-500

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














