


default search action
15th CRYPTO 1995: Santa Barbara, California, USA
- Don Coppersmith:

Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings. Lecture Notes in Computer Science 963, Springer 1995, ISBN 3-540-60221-6
MAC and Hash
- Bart Preneel, Paul C. van Oorschot

:
MDx-MAC and Building Fast MACs from Hash Functions. 1-14 - Mihir Bellare, Roch Guérin, Phillip Rogaway:

XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. 15-28 - Phillip Rogaway:

Bucket Hashing and its Application to Fast Message Authentication. 29-42
Number Theory I
- Richard Schroeppel, Hilarie K. Orman, Sean W. O'Malley, Oliver Spatscheck:

Fast Key Exchange with Elliptic Curve Systems. 43-56 - Philippe Béguin, Jean-Jacques Quisquater:

Fast Server-Aided RSA Signatures Secure Against Active Attacks. 57-69 - Chae Hoon Lim, Pil Joong Lee:

Security and Performance of Server-Aided RSA Computation Protocols. 70-83
Oblivious Transfer
- Shai Halevi:

Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. 84-96 - Donald Beaver:

Precomputing Oblivious Transfer. 97-109 - Claude Crépeau, Jeroen van de Graaf, Alain Tapp:

Committed Oblivious Transfer and Private Multi-Party Computation. 110-123 - Dominic Mayers:

On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols. 124-135
Cryptanalysis I
- Thorsten Theobald

:
How to Break Shamir's Asymmetric Basis. 136-147 - Sangjoon Park, Sangjin Lee, Seung-Cheol Goh:

On the Security of the Gollmann Cascades. 148-156 - Kazuo Ohta, Shiho Moriai, Kazumaro Aoki:

Improving the Search Algorithm for the Best Linear Expression. 157-170 - Burton S. Kaliski Jr., Yiqun Lisa Yin:

On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. 171-184
Key Escrow
- Silvio Micali, Ray Sidney:

A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. 185-196 - Arjen K. Lenstra, Peter Winkler

, Yacov Yacobi:
A Key Escrow System with Warrant Bounds. 197-207 - Joe Kilian, Frank Thomson Leighton:

Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract). 208-221 - Yair Frankel, Moti Yung:

Escrow Encryption Systems Visited: Attacks, Analysis and Designs. 222-235
Protocols
- Ross J. Anderson, Roger M. Needham:

Robustness Principles for Public Key Protocols. 236-247
Cryptanalysis II
- Jacques Patarin:

Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88. 248-261 - Andrew Klapper, Mark Goresky:

Cryptanalysis Based on 2-Adic Rational Approximation. 262-273 - Lars R. Knudsen:

A Key-schedule Weakness in SAFER K-64. 274-286 - Yair Frankel, Moti Yung:

Cryptanalysis of the Immunized LL Public Key Systems. 287-296
Zero Knowledge, Interactive Protocols
- Ronald Cramer, Ivan Damgård:

Secure Signature Schemes based on Interactive Protocols. 297-310 - Joe Kilian:

Improved Efficient Arguments (Preliminary Version). 311-324 - Ivan Damgård, Oded Goldreich

, Tatsuaki Okamoto, Avi Wigderson:
Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. 325-338
Secret Sharing I
- Amir Herzberg

, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung:
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. 339-352 - Amos Beimel

, Benny Chor:
Secret Sharing with Public Reconstruction (Extended Abstract). 353-366 - G. R. Blakley, Gregory Kabatianskii:

General Perfect Secret Sharing Schemes. 367-371
Number Theory II
- Bruce Dodson, Arjen K. Lenstra:

NFS with Four Large Primes: An Explosive Experiment. 372-385 - Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra:

Some Remarks on Lucas-Based Cryptosystems. 386-396
Secret Sharing II
- Susan K. Langford:

Threshold DSS Signatures without a Trusted Party. 397-409 - Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata

:
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes. 410-423
Everything Else
- Dan Boneh, Richard J. Lipton:

Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). 424-437 - Tatsuaki Okamoto:

An Efficient Divisible Electronic Cash Scheme. 438-451 - Dan Boneh, James Shaw:

Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). 452-465

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














