Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
Hilfe
Suche: Series=LNCS AND Volume=839
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
The first experimental cryptanalysis of the data encryption standard
Mitsuru Matsui
Lecture Notes in Computer Science
839
, 1994, pp. 1-11
Linearcryptanalysis of the fast data encipherment algorithm
Kazuo Ohta
,
Kazumaro Aoki
Lecture Notes in Computer Science
839
, 1994, pp. 12-16
Differential-linear cryptanalysis
Susan K. Langford
,
Martin E. Hellman
Lecture Notes in Computer Science
839
, 1994, pp. 17-25
Linear cryptanalysis using multiple approximations
Burton S., Jr. Kaliski
,
M.J.B. Robshaw
Lecture Notes in Computer Science
839
, 1994, pp. 26-39
Hashing with
SL_2
Jean-Pierre Tillich
,
Gilles Zémor
Lecture Notes in Computer Science
839
, 1994, pp. 40-49
Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks
Jinhui Chao
,
Kazuo Tanada
,
Shigeo Tsujii
Lecture Notes in Computer Science
839
, 1994, pp. 50-55
Cryptographic protocols based on discrete logarithms in real-quadratic orders
Ingrid Biehl
,
Johannes Buchmann
,
Christoph Thiel
Lecture Notes in Computer Science
839
, 1994, pp. 56-60
Designated confirmer signatures and public-key encryption are equivalent
Tatsuaki Okamoto
Lecture Notes in Computer Science
839
, 1994, pp. 61-74
Directed acyclic graphs, one-way functions and digital signatures
Daniel Bleichenbacher
,
Ueli M. Maurer
Lecture Notes in Computer Science
839
, 1994, pp. 75-82
An identity-based signature scheme with bounded life-span
Olivier Delos
,
Jean-Jacques Quisquater
Lecture Notes in Computer Science
839
, 1994, pp. 83-94
More flexible exponentiation with precomputation
Chae Hoon Lim
,
Pil Joong Lee
Lecture Notes in Computer Science
839
, 1994, pp. 95-107
A parallel permutation multiplier for a PGM crypto-chip
Tamás Horváth
,
Spyros S. Magliveras
,
Tran van Trung
Lecture Notes in Computer Science
839
, 1994, pp. 108-113
Cryptographic randomness from air turbulence in disk drives
Don Davis
,
Ross Ihaka
,
Philip Fenstermacher
Lecture Notes in Computer Science
839
, 1994, pp. 114-120
Cryptanalysis of the Gemmell and Naor multiround authentication protocol
Christian Gehrmann
Lecture Notes in Computer Science
839
, 1994, pp. 121-128
LFSR-based hashing and authentication
Hugo Krawczyk
Lecture Notes in Computer Science
839
, 1994, pp. 129-139
New bound on authentication code with arbitration
Kaoru Kurosawa
Lecture Notes in Computer Science
839
, 1994, pp. 140-149
Multi-secret sharing schemes
Carlo Blundo
,
Alfredo De Santis
,
Giovanni Di Crescenzo
,
Antonio Giorgio Gaggia
,
Ugo Vaccaro
Lecture Notes in Computer Science
839
, 1994, pp. 150-163
Designing identification schemes with keys of short size
Jacques Stern
Lecture Notes in Computer Science
839
, 1994, pp. 164-173
Proofs of partial knowledge and simplified design of witness hiding protocols
Ronald Cramer
,
Ivan Damgård
,
Berry Schoenmakers
Lecture Notes in Computer Science
839
, 1994, pp. 174-187
Language dependent secure bit commitment
Toshiya Itoh
,
Yuji Ohta
,
Hiroki Shizuya
Lecture Notes in Computer Science
839
, 1994, pp. 188-201
On the length of cryptographic hash-values used in identification schemes
Marc Girault
,
Jacques Stern
Lecture Notes in Computer Science
839
, 1994, pp. 202-215
Incremental cryptography: The case of hashing and signing
Mihir Bellare
,
Oded Goldreich
,
Shafi Goldwasser
Lecture Notes in Computer Science
839
, 1994, pp. 216-233
An efficient existentially unforgeable signature scheme and its applications
Cynthia Dwork
,
Moni Naor
Lecture Notes in Computer Science
839
, 1994, pp. 234-246
Bounds for resilient functions and orthogonal arrays
Jürgen Bierbrauer
,
K. Gopalakrishnan
,
D.R. Stinson
Lecture Notes in Computer Science
839
, 1994, pp. 247-256
Tracing traitors
Benny Chor
,
Amos Fiat
,
Moni Naor
Lecture Notes in Computer Science
839
, 1994, pp. 257-270
Seiten 1
2
>