C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
AUSCRYPT
1990
1991
1992
1993
1990
1993
Keyphrases
Publications
volume 718, 1993
Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings
AUSCRYPT
718 (1993)
1992
L. Tombak
,
Reihaneh Safavi-Naini
Authentication Codes with Perfect Protection.
AUSCRYPT
(1992)
Sung-Ming Yen
,
Chi-Sung Laih
The Fast Cascade Exponentation Algorithm and its Applications on Cryptography.
AUSCRYPT
(1992)
Andrew Klapper
The Vulnerability of Geometric Sequences Based on Fields on Odd Characteristic.
AUSCRYPT
(1992)
Christine M. O'Keefe
A Comparison of Key Distribution Patterns Constructed from Circle Geometries.
AUSCRYPT
(1992)
Manuel Cerecedo
,
Tsutomu Matsumoto
,
Hideki Imai
Non-Interactive Generation of Shared Pseudorandom Sequences.
AUSCRYPT
(1992)
Wen-Ai Jackson
,
Keith M. Martin
Cumulative Arrays and Geometric Secret Sharing Schemes.
AUSCRYPT
(1992)
Kouichi Sakurai
,
Toshiya Itoh
On Bit Correlations Among Preimages of "Many to One" One-Way Functions.
AUSCRYPT
(1992)
Michael Portz
A Generalized Description of DES-based and Benes-based Permutationgenerators.
AUSCRYPT
(1992)
Bart Preneel
,
René Govaerts
,
Joos Vandewalle
On the Power of Memory in the Design of Collision Resistant Hash Functions.
AUSCRYPT
(1992)
Christian Waldvogel
,
James L. Massey
The Probability Distribution of the Diffie-Hellman Key.
AUSCRYPT
(1992)
Alain P. Hiltgen
Constructions of Freebly-One-Way Families of Permutations.
AUSCRYPT
(1992)
Thomas Hardjono
,
Yuliang Zheng
A Practical Digital Multisignature Scheme Based on Discrete Logarithms.
AUSCRYPT
(1992)
Jörg Sauerbrey
A Modular Exponentiation Unit Based on Systolic Arrays.
AUSCRYPT
(1992)
Reihaneh Safavi-Naini
,
L. Tombak
Authentication Codes under Impersonation Attack.
AUSCRYPT
(1992)
Lein Harn
,
Shoubao Yang
Public-Key Cryptosystem Based on the Discrete Logarithm Problem.
AUSCRYPT
(1992)
Valery I. Korzhik
,
Viktor Yakovlev
Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk).
AUSCRYPT
(1992)
Jennifer Seberry
,
Xian-Mo Zhang
Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion.
AUSCRYPT
(1992)
Lars R. Knudsen
Cryptanalysis of LOKI91.
AUSCRYPT
(1992)
Benjamin B. Nieh
,
Stafford E. Tavares
Modelling and Analyzing Cryprographic Protocols Using Petri Nets.
AUSCRYPT
(1992)
Tsutomu Matsumoto
,
Hideki Imai
,
Chi-Sung Laih
,
Sung-Ming Yen
On Verifiable Implicit Asking Protocols for RSA Computation.
AUSCRYPT
(1992)
Chae Hoon Lim
,
Pil Joong Lee
Modified Maurer-Yacobi's scheme and its applications.
AUSCRYPT
(1992)
Leisa Condie
Prime Generation with the Demytko-Miller-Trbuvich Algorithm.
AUSCRYPT
(1992)
John Detombe
,
Stafford E. Tavares
Constructing Large Cryptographically Strong S-boxes.
AUSCRYPT
(1992)
Chris Charnes
,
Josef Pieprzyk
Linear Nonequivalence versus Nonlinearity.
AUSCRYPT
(1992)
Bart Preneel
,
René Govaerts
,
Joos Vandewalle
An Attack on Two Hash Functions by Zheng-Matsumoto-Imai.
AUSCRYPT
(1992)
Jean Claude Paillès
New Protocols for Electronic Money.
AUSCRYPT
(1992)
Kouichi Sakurai
,
Toshiya Itoh
Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes.
AUSCRYPT
(1992)
Miodrag J. Mihaljevic
An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure.
AUSCRYPT
(1992)
Chin-Chen Chang
,
Tzong-Chen Wu
,
C. P. Chen
The Design of a Conference Key Distribution System.
AUSCRYPT
(1992)
Edward Zuk
Remarks on "The Design of a Conference Key Distribution System".
AUSCRYPT
(1992)
John Snare
Information Technology Security Standards - An Australian Perspective.
AUSCRYPT
(1992)
Rudolf Lidl
,
Winfried B. Müller
Primality Testing with Lucas Functions.
AUSCRYPT
(1992)
Michael Bertilsson
,
Ingemar Ingemarsson
A Construction of Practical Secret Sharing Schemes using Linear Block Codes.
AUSCRYPT
(1992)
Ed Dawson
Cryptanalysis of Summation Generator.
AUSCRYPT
(1992)
Yvo Desmedt
Treshold Cryptosystems (invited talk).
AUSCRYPT
(1992)
Wakaha Ogata
,
Kaoru Kurosawa
,
Shigeo Tsujii
Nonperfect Secret Sharing Schemes.
AUSCRYPT
(1992)
Yuliang Zheng
,
Josef Pieprzyk
,
Jennifer Seberry
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output.
AUSCRYPT
(1992)
Atsuko Miyaji
Suitable for Cryptosystems.
AUSCRYPT
(1992)
Jun-Hui Yang
,
Zong-Duo Dai
Construction of m-ary de Bruijn Sequences (Extendet abstract).
AUSCRYPT
(1992)
Mike Rezny
,
Eddie Trimarchi
A Block Cipher Method using Combinations of Different Methods under the Control of the User Key.
AUSCRYPT
(1992)
Takashi Satoh
,
Kaoru Kurosawa
,
Shigeo Tsujii
Privacy for Multi-Party Protocols.
AUSCRYPT
(1992)
Atsushi Fujioka
,
Tatsuaki Okamoto
,
Kazuo Ohta
A Practical Secret Voting Scheme for Large Scale Elections.
AUSCRYPT
(1992)
Lein Harn
,
Shoubao Yang
Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party.
AUSCRYPT
(1992)
Chi-Sung Laih
,
Sung-Ming Yen
Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols.
AUSCRYPT
(1992)
Yvo Desmedt
,
Jennifer Seberry
Practical Proven Secure Authentication with Arbitration.
AUSCRYPT
(1992)
Xuejia Lai
,
Rainer A. Rueppel
,
Jack Woollven
A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers.
AUSCRYPT
(1992)
1990
Lawrence Brown
,
Jennifer Seberry
Key Scheduling In Des Type Cryptosystems.
AUSCRYPT
(1990)
Hikaru Morita
A Fast Modular-multiplication Module for Smart Cards.
AUSCRYPT
(1990)
David Chaum
Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms.
AUSCRYPT
(1990)