Advances in cryptology - ASIACRYPT '94. 4th international conference on the theory and applications of cryptology, Wollongong, Australia, November 28 - December 1, 1994. Proceedings (Q1892492)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Advances in cryptology - ASIACRYPT '94. 4th international conference on the theory and applications of cryptology, Wollongong, Australia, November 28 - December 1, 1994. Proceedings |
scientific article; zbMATH DE number 765036
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Advances in cryptology - ASIACRYPT '94. 4th international conference on the theory and applications of cryptology, Wollongong, Australia, November 28 - December 1, 1994. Proceedings |
scientific article; zbMATH DE number 765036 |
Statements
Advances in cryptology - ASIACRYPT '94. 4th international conference on the theory and applications of cryptology, Wollongong, Australia, November 28 - December 1, 1994. Proceedings (English)
0 references
18 June 1995
0 references
The articles of this volume will be reviewed individually. The conference 1991 has been reviewed (see Zbl 0801.00055). Indexed articles: \textit{Beth, Thomas}, Multifeature security through homomorphic encryption, 3-17 [Zbl 0871.94025] \textit{Desmedt, Yvo; Di Crescenzo, Giovanni; Burmester, Mike}, Multiplicative non-abelian sharing schemes and their application to threshold cryptography, 21-32 [Zbl 0871.94029] \textit{Okada, Koji; Kurosawa, Kaoru}, Lower bound on the size of shares of nonperfect secret sharing schemes, 33-41 [Zbl 0871.94038] \textit{Jackson, Wen-Ai; Martin, Keith M.; O'Keefe, Christine M.}, On sharing many secrets. (Extended abstract), 42-54 [Zbl 0871.94033] \textit{Kurosawa, Kaoru; Okada, Koji}, Combinatorial interpretation of secret sharing schemes, 55-64 [Zbl 0871.94035] \textit{Mihaljević, Miodrag J.}, A correlation attack on binary sequence generators with time-varying output function, 67-79 [Zbl 0872.94024] \textit{Fúster-Sabater, Amparo; Caballero-Gil, Pino}, On the linear complexity of nonlinearly filtered PN-sequences, 80-90 [Zbl 0872.94030] \textit{Golić, Jovan Dj.}, Intrinsic statistical weakness of keystream generators, 91-103 [Zbl 0871.94019] \textit{Chee, Seongtaek; Lee, Sangjin; Kim, Kwangjo}, Semi-bent functions, 107-118 [Zbl 0871.94028] \textit{Seberry, Jennifer; Zhang, Xian-Mo; Zheng, Yuliang}, Structures of cryptographic functions with strong avalanche characteristics. (Extended abstract), 119-132 [Zbl 0872.94039] \textit{Meadows, Catherine A.}, Formal verification of cryptographic protocols: A survey, 135-150 [Zbl 0872.94035] \textit{Yacobi, Yacov}, Efficient electronic money. (Extended abstract), 153-163 [Zbl 0877.68125] \textit{Niemi, Valtteri; Renvall, Ari}, How to prevent buying of votes in computer elections, 164-170 [Zbl 0877.68040] \textit{Boyd, Colin; Mao, Wenbo}, Design and analysis of key exchange protocols via secure channel identification, 171-181 [Zbl 0877.68041] \textit{De Santis, Alfredo; Okamoto, Tatsuaki; Persiano, Giuseppe}, Zero-knowledge proofs of computational power in the shared string model, 182-192 [Zbl 0878.68078] \textit{Imai, Hideki}, Information security aspects of spread spectrum systems, 195-208 [Zbl 1114.68414] \textit{Safavi-Naini, R.; Tombak, L.}, Combinatorial structure of \(A\)-codes with \(r\)-fold security, 211-223 [Zbl 0872.94037] \textit{Horster, Patrick; Michels, Markus; Petersen, Holger}, Meta-message recovery and meta-blind signature schemes based on the discrete logarithm problem and their applications, 224-237 [Zbl 0872.94031] \textit{Alabbadi, Mohssen; Wicker, Stephen B.}, A digital signature scheme based on linear error-correcting block codes, 238-248 [Zbl 0872.94025] \textit{Béguin, Philippe; Quisquater, Jean-Jacques}, Secure acceleration of DSS signatures using insecure server, 249-259 [Zbl 0872.94026] \textit{Atkins, Derek; Graff, Michael; Lenstra, Arjen K.; Leyland, Paul C.}, The magic words are squeamish ossifrage. (Extended abstract), 263-277 [Zbl 0877.94026] \textit{Biham, Eli}, Cryptanalysis of multiple modes of operation, 278-292 [Zbl 0872.94027] \textit{Tokita, Toshio; Sorimachi, Tohru; Matsui, Mitsuru}, Linear cryptanalysis of LOKI and \(s^2\text{DES}\), 293-303 [Zbl 0877.94043] \textit{Patarin, Jacques}, Collisions and inversions for Damgård's whole hash function, 307-321 [Zbl 1126.94336] \textit{Charnes, Chris; Pieprzyk, Josef}, Attacking the \(\mathrm{SL}_2\) hashing scheme, 322-330 [Zbl 1126.94323] \textit{Kurosawa, Kaoru; Okada, Koji; Sakano, Keiichi}, Security of the center in key distribution schemes, 333-341 [Zbl 0872.94032] \textit{Matsumoto, Tsutomu}, Incidence structures for key sharing. (Extended abstract), 342-353 [Zbl 0872.94034] \textit{Smith, Peter; Skinner, Christopher}, A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms, 357-364 [Zbl 0872.94041] \textit{Abe, Masayuki; Morita, Hikaru}, Higher radix nonrestoring modular multiplication algorithm and public-key LSI architecture with limited hardware resources, 365-375 [Zbl 0868.94034] \textit{Kurosawa, Kaoru; Okada, Koji; Tsujii, Shigeo}, Low exponent attack against elliptic curve RSA, 376-383 [Zbl 0877.94035] \textit{O'Connor, Luke; Golić, Jovan Dj.}, A unified Markov approach to differential and linear cryptanalysis, 387-397 [Zbl 0872.94036] \textit{Biham, Eli; Biryukov, Alex}, How to strengthen DES using existing hardware, 398-412 [Zbl 0873.94014] \textit{Chang, Xingong; Dai, Zongduo; Gong, Guang}, Some cryptographic properties of exponential functions, 415-418 [Zbl 0872.94029] \textit{Beaver, Donald}, Factoring: The DNA solution, 419-423 [Zbl 0877.68052] \textit{Stern, Jacques}, Can one design a signature scheme based on error-correcting codes?, 424-426 [Zbl 0872.94042] \textit{Carter, G.; Clark, A.; Nielsen, L.}, DESV-1: A variation of the data encryption standard (DES), 427-430 [Zbl 0872.94028]
0 references
Cryptology
0 references
ASIACRYPT
0 references
Wollongong (Australia)
0 references
Proceedings
0 references
Conference
0 references
0.8906084
0 references
0.88438386
0 references
0 references
0.87804765
0 references
0.87708294
0 references
0.8747736
0 references
0.87330294
0 references
0.8717326
0 references
0.8689634
0 references