What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1993
Year
Venue
Title
1993
CRYPTO
A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity
Toshiya Itoh
Masafumi Hoshi
Shigeo Tsujii
1993
CRYPTO
A New Identification Scheme Based on Syndrome Decoding
Jacques Stern
1993
CRYPTO
A Status Report On the Federal Government Key Escrow System
★
Invited talk
Miles E. Smid
1993
CRYPTO
A Subexponential Algorithm for Discrete Logarithms over All Finite Fields
Leonard M. Adleman
Jonathan DeMarrais
1993
CRYPTO
Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings
1993
CRYPTO
An Implementation of the General Number Field Sieve
Johannes Buchmann
J. Loho
J. Zayer
1993
CRYPTO
An Integrity Check Value Algorithm for Stream Ciphers
Richard Taylor
1993
CRYPTO
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks
Chae Hoon Lim
Pil Joong Lee
1993
CRYPTO
Attacks on the Birational Permutation Signature Schemes
Don Coppersmith
Jacques Stern
Serge Vaudenay
1993
CRYPTO
Broadcast Encryption
Amos Fiat
Moni Naor
1993
CRYPTO
Codes for Interactive Authentication
Peter Gemmell
Moni Naor
1993
CRYPTO
Comparison of Three Modular Reduction Functions
Antoon Bosselaers
René Govaerts
Joos Vandewalle
1993
CRYPTO
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds
Bart Preneel
Marnix Nuttin
Vincent Rijmen
Johan Buelens
1993
CRYPTO
Cryptographic Primitives Based on Hard Learning Problems
Avrim Blum
Merrick L. Furst
Michael J. Kearns
Richard J. Lipton
1993
CRYPTO
Differential Attack on Message Authentication Codes
Kazuo Ohta
Mitsuru Matsui
1993
CRYPTO
Differtial Cryptanalysis of Lucifer
Ishai Ben-Aroya
Eli Biham
1993
CRYPTO
Discreet Solitary Games
Claude Crépeau
Joe Kilian
1993
CRYPTO
Efficient Signature Schemes Based on Birational Permutations
Adi Shamir
1993
CRYPTO
Entity Authentication and Key Distribution
Mihir Bellare
Phillip Rogaway
1993
CRYPTO
Extensions of Single-term Coins
Niels Ferguson
1993
CRYPTO
Fully Dynamic Secret Sharing Schemes
Carlo Blundo
Antonella Cresti
Alfredo De Santis
Ugo Vaccaro
1993
CRYPTO
Hash Functions Based on Block Ciphers: A Synthetic Approach
Bart Preneel
René Govaerts
Joos Vandewalle
1993
CRYPTO
Improved Algorithms for the Permuted Kernel Problem
Jacques Patarin
Pascal Chauvaud
1993
CRYPTO
Interaction in Key Distribution Schemes (Extended Abstract)
Amos Beimel
Benny Chor
1993
CRYPTO
Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract)
Ivan Damgård
1993
CRYPTO
Joint Encryption and Message-Efficient Secure Computation
Matthew K. Franklin
Stuart Haber
1993
CRYPTO
Multisecret Threshold Schemes
Wen-Ai Jackson
Keith M. Martin
Christine M. O'Keefe
1993
CRYPTO
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract)
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1993
CRYPTO
On Families of Hash Functions via Geometric Codes and Concatenation
Jürgen Bierbrauer
Thomas Johansson
Gregory Kabatianskii
Ben J. M. Smeets
1993
CRYPTO
On Message Proof Systems with Known Space Verifiers
Yonatan Aumann
Uriel Feige
1993
CRYPTO
On the Construction of Perfect Authentication Codes that Permit Arbitration
Thomas Johansson
1993
CRYPTO
On the Distribution of Characteristics in Composite Permutations
Luke O'Connor
1993
CRYPTO
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures
Ivan Damgård
Torben P. Pedersen
Birgit Pfitzmann
1993
CRYPTO
On the Factorization of RSA-120
Thomas F. Denny
Bruce Dodson
Arjen K. Lenstra
Mark S. Manasse
1993
CRYPTO
Remark on the Threshold RSA Signature Scheme
Chuan-Ming Li
Tzonelih Hwang
Narn-Yih Lee
1993
CRYPTO
Secret Sharing and Perfect Zero Knowledge
Alfredo De Santis
Giovanni Di Crescenzo
Giuseppe Persiano
1993
CRYPTO
Secret Sharing Made Short
Hugo Krawczyk
1993
CRYPTO
Secret-Key Agreement without Public-Key Cryptography
Frank Thomson Leighton
Silvio Micali
1993
CRYPTO
Security of Iterated Hash Functions Based on Block Ciphers
Walter Hohl
Xuejia Lai
Thomas Meier
Christian Waldvogel
1993
CRYPTO
The Shrinking Generator
Don Coppersmith
Hugo Krawczyk
Yishay Mansour
1993
CRYPTO
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract)
Stefan Brands
1993
CRYPTO
Weak Keys for IDEA
Joan Daemen
René Govaerts
Joos Vandewalle