Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/eurocrypt/eurocrypt91.bht:"
@inproceedings{DBLP:conf/eurocrypt/Berkovits91, author = {Shimshon Berkovits}, editor = {Donald W. Davies}, title = {How To Broadcast {A} Secret}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {535--541}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_50}, doi = {10.1007/3-540-46416-6\_50}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Berkovits91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BethS91, author = {Thomas Beth and F. Schaefer}, editor = {Donald W. Davies}, title = {Non Supersingular Elliptic Curves for Public Key Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {316--327}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_27}, doi = {10.1007/3-540-46416-6\_27}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BethS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Biham91, author = {Eli Biham}, editor = {Donald W. Davies}, title = {Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {532--534}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_49}, doi = {10.1007/3-540-46416-6\_49}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Biham91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamS91, author = {Eli Biham and Adi Shamir}, editor = {Donald W. Davies}, title = {Differential Cryptanalysis of Feal and N-Hash}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {1--16}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_1}, doi = {10.1007/3-540-46416-6\_1}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Boyd91, author = {Colin Boyd}, editor = {Donald W. Davies}, title = {Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {266--280}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_23}, doi = {10.1007/3-540-46416-6\_23}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Boyd91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Brynielsson91, author = {Lennart Brynielsson}, editor = {Donald W. Davies}, title = {The Information Leakage through a Randomly Generated Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {552--553}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_53}, doi = {10.1007/3-540-46416-6\_53}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Brynielsson91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BurmesterD91, author = {Mike Burmester and Yvo Desmedt}, editor = {Donald W. Davies}, title = {Broadcast Interactive Proofs (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {81--95}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_7}, doi = {10.1007/3-540-46416-6\_7}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BurmesterD91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CamionP91, author = {Paul Camion and Jacques Patarin}, editor = {Donald W. Davies}, title = {The Knapsack Hash Function proposed at Crypto'89 can be broken}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {39--53}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_3}, doi = {10.1007/3-540-46416-6\_3}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CamionP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChambersD91, author = {William G. Chambers and Zong{-}Duo Dai}, editor = {Donald W. Davies}, title = {On Binary Sequences from Recursions modulo 2\({}^{\mbox{e}}\) Made Non-Linear by the Bit-by-Bit {XOR} Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {200--204}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_18}, doi = {10.1007/3-540-46416-6\_18}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChambersD91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Chaum91, author = {David Chaum}, editor = {Donald W. Davies}, title = {Some Weaknesses of "Weaknesses of Undeniable Signatures"}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {554--556}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_54}, doi = {10.1007/3-540-46416-6\_54}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Chaum91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaumH91, author = {David Chaum and Eug{\`{e}}ne van Heyst}, editor = {Donald W. Davies}, title = {Group Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {257--265}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_22}, doi = {10.1007/3-540-46416-6\_22}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaumH91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChepyzhovS91, author = {Vladimir V. Chepyzhov and Ben J. M. Smeets}, editor = {Donald W. Davies}, title = {On {A} Fast Correlation Attack on Certain Stream Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {176--185}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_16}, doi = {10.1007/3-540-46416-6\_16}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChepyzhovS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CosterLO91, author = {Matthijs J. Coster and Brian A. LaMacchia and Andrew M. Odlyzko and Claus{-}Peter Schnorr}, editor = {Donald W. Davies}, title = {An Improved Low-Denisty Subset Sum Algorithm}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {54--67}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_4}, doi = {10.1007/3-540-46416-6\_4}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CosterLO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CrepeauS91, author = {Claude Cr{\'{e}}peau and Miklos Santha}, editor = {Donald W. Davies}, title = {On the Reversibility of Oblivious Transfer}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {106--113}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_9}, doi = {10.1007/3-540-46416-6\_9}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CrepeauS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DaiY91, author = {Zong{-}Duo Dai and Jun{-}Hui Yang}, editor = {Donald W. Davies}, title = {Linear Complexity of Periodically Repeated Random Sequences}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {168--175}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_15}, doi = {10.1007/3-540-46416-6\_15}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DaiY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DawsonT91, author = {M. H. Dawson and Stafford E. Tavares}, editor = {Donald W. Davies}, title = {An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {352--367}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_30}, doi = {10.1007/3-540-46416-6\_30}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DawsonT91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DesmedtY91, author = {Yvo Desmedt and Moti Yung}, editor = {Donald W. Davies}, title = {Weakness of Undeniable Signature Schemes (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {205--220}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_19}, doi = {10.1007/3-540-46416-6\_19}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DesmedtY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FujiokaOM91, author = {Atsushi Fujioka and Tatsuaki Okamoto and Shoji Miyaguchi}, editor = {Donald W. Davies}, title = {{ESIGN:} An Efficient Digital Signature Implementation for Smard Cards}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {446--457}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_38}, doi = {10.1007/3-540-46416-6\_38}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FujiokaOM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FujiokaOO91, author = {Atsushi Fujioka and Tatsuaki Okamoto and Kazuo Ohta}, editor = {Donald W. Davies}, title = {Interactive Bi-Proof Systems and Undeniable Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {243--256}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_21}, doi = {10.1007/3-540-46416-6\_21}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FujiokaOO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GabidulinPT91, author = {Ernst M. Gabidulin and A. V. Paramonov and O. V. Tretjakov}, editor = {Donald W. Davies}, title = {Ideals over a Non-Commutative Ring and thier Applications in Cryptology}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {482--489}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_41}, doi = {10.1007/3-540-46416-6\_41}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GabidulinPT91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Gibson91, author = {J. K. Gibson}, editor = {Donald W. Davies}, title = {Equivalent Goppa Codes and Trapdoors to McEliece's Public Key Cryptosystem}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {517--521}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_46}, doi = {10.1007/3-540-46416-6\_46}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Gibson91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Girault91, author = {Marc Girault}, editor = {Donald W. Davies}, title = {Self-Certified Public Keys}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {490--497}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_42}, doi = {10.1007/3-540-46416-6\_42}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Girault91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoldburgDS91, author = {Bruce Goldburg and Ed Dawson and S. Sridharan}, editor = {Donald W. Davies}, title = {The Automated Cryptanalysis of Analog Speech Scramblers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {422--430}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_36}, doi = {10.1007/3-540-46416-6\_36}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoldburgDS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Golic91, author = {Jovan Dj. Golic}, editor = {Donald W. Davies}, title = {The Number of Output Sequences of a Binary Sequence Generator}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {160--167}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_14}, doi = {10.1007/3-540-46416-6\_14}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Golic91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HabutsuNSM91, author = {Toshiki Habutsu and Yoshifumi Nishio and Iwao Sasase and Shinsaku Mori}, editor = {Donald W. Davies}, title = {A Secret Key Cryptosystem by Iterating a Chaotic Map}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {127--140}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_11}, doi = {10.1007/3-540-46416-6\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HabutsuNSM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HorsterK91, author = {Patrick Horster and Hans{-}Joachim Knobloch}, editor = {Donald W. Davies}, title = {Discrete Logarithm Based Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {399--408}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_34}, doi = {10.1007/3-540-46416-6\_34}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HorsterK91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Huber91, author = {Klaus Huber}, editor = {Donald W. Davies}, title = {Some Considerations concerning the Selection of {RSA} Moduli}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {294--301}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_25}, doi = {10.1007/3-540-46416-6\_25}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Huber91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Jansen91, author = {Cees J. A. Jansen}, editor = {Donald W. Davies}, title = {The Maximum Order Complexity of Sequence Ensembles}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {153--159}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_13}, doi = {10.1007/3-540-46416-6\_13}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Jansen91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KorzhikT91, author = {Valery I. Korzhik and Andrew I. Turkin}, editor = {Donald W. Davies}, title = {Cryptanalysis of McEliece's Public-Key Cryptosystem}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {68--70}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_5}, doi = {10.1007/3-540-46416-6\_5}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KorzhikT91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiM91, author = {Xuejia Lai and James L. Massey and Sean Murphy}, editor = {Donald W. Davies}, title = {Markov Ciphers and Differential Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {17--38}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_2}, doi = {10.1007/3-540-46416-6\_2}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Matsumoto91, author = {Tsutomu Matsumoto and Hideki Imai}, editor = {Donald W. Davies}, title = {Human Identification Through Insecure Channel}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {409--421}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_35}, doi = {10.1007/3-540-46416-6\_35}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Matsumoto91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Maurer91, author = {Ueli M. Maurer}, editor = {Donald W. Davies}, title = {New Approaches to the Design of Self-Synchronizing Stream Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {458--471}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_39}, doi = {10.1007/3-540-46416-6\_39}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Maurer91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MaurerY91, author = {Ueli M. Maurer and Yacov Yacobi}, editor = {Donald W. Davies}, title = {Non-interactive Public-Key Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {498--507}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_43}, doi = {10.1007/3-540-46416-6\_43}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MaurerY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MeierS91, author = {Willi Meier and Othmar Staffelbach}, editor = {Donald W. Davies}, title = {Analysis of Pseudo Random Sequence Generated by Cellular Automata}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {186--199}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_17}, doi = {10.1007/3-540-46416-6\_17}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MeierS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MihaljevicG91, author = {Miodrag J. Mihaljevic and Jovan Dj. Golic}, editor = {Donald W. Davies}, title = {A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {527--531}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_48}, doi = {10.1007/3-540-46416-6\_48}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MihaljevicG91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Morain91, author = {Fran{\c{c}}ois Morain}, editor = {Donald W. Davies}, title = {Building Elliptic Curves Modulo Large Primes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {328--336}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_28}, doi = {10.1007/3-540-46416-6\_28}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Morain91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MullerO91, author = {Winfried B. M{\"{u}}ller and Alan Oswald}, editor = {Donald W. Davies}, title = {Dickson Pseudoprimes and Primality Testing}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {512--516}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_45}, doi = {10.1007/3-540-46416-6\_45}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MullerO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Mund91, author = {Sibylle Mund}, editor = {Donald W. Davies}, title = {Liv-Lempel Complexity for Periodic Sequences and its Cryptographic Application}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {114--126}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_10}, doi = {10.1007/3-540-46416-6\_10}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Mund91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Nyberg91, author = {Kaisa Nyberg}, editor = {Donald W. Davies}, title = {Perfect Nonlinear S-Boxes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {378--386}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_32}, doi = {10.1007/3-540-46416-6\_32}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Nyberg91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OConnor91, author = {Luke O'Connor}, editor = {Donald W. Davies}, title = {Enumerating Nondegenerate Permutations}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {368--377}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_31}, doi = {10.1007/3-540-46416-6\_31}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OConnor91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OkamotoCO91, author = {Tatsuaki Okamoto and David Chaum and Kazuo Ohta}, editor = {Donald W. Davies}, title = {Direct Zero Knowledge Proofs of Computational Power in Five Rounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {96--105}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_8}, doi = {10.1007/3-540-46416-6\_8}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OkamotoCO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pedersen91, author = {Torben P. Pedersen}, editor = {Donald W. Davies}, title = {Distributed Provers with Applications to Undeniable Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {221--242}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_20}, doi = {10.1007/3-540-46416-6\_20}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pedersen91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pedersen91a, author = {Torben P. Pedersen}, editor = {Donald W. Davies}, title = {A Threshold Cryptosystem without a Trusted Party (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {522--526}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_47}, doi = {10.1007/3-540-46416-6\_47}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pedersen91a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pieprzyk91, author = {Josef Pieprzyk}, editor = {Donald W. Davies}, title = {Probabilistic Analysis of Elementary Randimizers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {542--546}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_51}, doi = {10.1007/3-540-46416-6\_51}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pieprzyk91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PieprzykS91, author = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, editor = {Donald W. Davies}, title = {Randomized Authentication Systems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {472--481}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_40}, doi = {10.1007/3-540-46416-6\_40}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PieprzykS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Portz91, author = {Michael Portz}, editor = {Donald W. Davies}, title = {On the Use of Interconnection Networks in Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {302--315}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_26}, doi = {10.1007/3-540-46416-6\_26}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Portz91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PreneelCFJLR91, author = {Bart Preneel and David Chaum and Walter Fumy and Cees J. A. Jansen and Peter Landrock and Gert Roelofsen}, editor = {Donald W. Davies}, title = {Race Integrity Primitives Evaluation {(RIPE):} {A} Status Report}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {547--551}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_52}, doi = {10.1007/3-540-46416-6\_52}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PreneelCFJLR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PreneelGV91, author = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Donald W. Davies}, title = {Boolean Functions Satisfying Higher Order Propagation Criteria}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {141--152}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_12}, doi = {10.1007/3-540-46416-6\_12}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PreneelGV91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Rooij91, author = {Peter de Rooij}, editor = {Donald W. Davies}, title = {On the Security of the Schnorr Scheme using Preprocessing}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {71--80}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_6}, doi = {10.1007/3-540-46416-6\_6}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Rooij91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Rueppel91, author = {Rainer A. Rueppel}, editor = {Donald W. Davies}, title = {A Formal Approach to Security Architectures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {387--398}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_33}, doi = {10.1007/3-540-46416-6\_33}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Rueppel91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SadeghiyanP91, author = {Babak Sadeghiyan and Josef Pieprzyk}, editor = {Donald W. Davies}, title = {A Construction for One Way Hash Functions and Pseudorandom Bit Generators}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {431--445}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_37}, doi = {10.1007/3-540-46416-6\_37}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SadeghiyanP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Schnorr91, author = {Claus{-}Peter Schnorr}, editor = {Donald W. Davies}, title = {Factoring Integers and Computing Discrete Logarithms via Diophantine Approximations}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {281--293}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_24}, doi = {10.1007/3-540-46416-6\_24}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Schnorr91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShizuyaIS91, author = {Hiroki Shizuya and Toshiya Itoh and Kouichi Sakurai}, editor = {Donald W. Davies}, title = {On the Complexity of Hyperelliptic Discrete Logarithm Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {337--351}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_29}, doi = {10.1007/3-540-46416-6\_29}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShizuyaIS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Zemor91, author = {Gilles Z{\'{e}}mor}, editor = {Donald W. Davies}, title = {Hash Functions And Graphs With Large Girths}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {508--511}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_44}, doi = {10.1007/3-540-46416-6\_44}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Zemor91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/91, editor = {Donald W. Davies}, title = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6}, doi = {10.1007/3-540-46416-6}, isbn = {3-540-54620-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.