What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1994
Year
Venue
Title
1994
CRYPTO
A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem
Henri Gilbert
Pascal Chauvaud
1994
CRYPTO
A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences
James L. Massey
Shirlei Serconek
1994
CRYPTO
A Parallel Permutation Multiplier for a PGM Crypto-chip
Tamás Horváth
Spyros S. Magliveras
Tran van Trung
1994
CRYPTO
A Randomnesss-Rounds Tradeoff in Private Computation
Eyal Kushilevitz
Adi Rosén
1994
CRYPTO
Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings
1994
CRYPTO
An Efficient Existentially Unforgeable Signature Scheme and its Applications
Cynthia Dwork
Moni Naor
1994
CRYPTO
An Identity-Based Signature Scheme with Bounded Life-Span
Olivier Delos
Jean-Jacques Quisquater
1994
CRYPTO
Attack on the Cryptographic Scheme NIKS-TAS
Don Coppersmith
1994
CRYPTO
Bounds for Resilient Functions and Orthogonal Arrays
Jürgen Bierbrauer
K. Gopalakrishnan
Douglas R. Stinson
1994
CRYPTO
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext
Yukiyasu Tsunoo
Eiji Okamoto
Tomohiko Uyematsu
1994
CRYPTO
Cryptanalysis of Cryptosystems Based on Remote Chaos Replication
Thomas Beth
Dejan E. Lazic
A. Mathias
1994
CRYPTO
Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol
Christian Gehrmann
1994
CRYPTO
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders
Ingrid Biehl
Johannes Buchmann
Christoph Thiel
1994
CRYPTO
Cryptographic Randomness from Air Turbulence in Disk Drives
Don Davis
Ross Ihaka
Philip Fenstermacher
1994
CRYPTO
Cryptography in the Commercial World --- Hardware Aspects
★
Invited talk
David Paul Maher
1994
CRYPTO
Cryptography in the Commercial World --- Software Aspects
★
Invited talk
Joseph Pato
1994
CRYPTO
Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks
Jinhui Chao
Kazuo Tanada
Shigeo Tsujii
1994
CRYPTO
Designated Confirmer Signatures and Public-Key Encryption are Equivalent
Tatsuaki Okamoto
1994
CRYPTO
Designing Identification Schemes with Keys of Short Size
Jacques Stern
1994
CRYPTO
Differential-Linear Cryptanalysis
Susan K. Langford
Martin E. Hellman
1994
CRYPTO
Directed Acyclic Graphs, One-way Functions and Digital Signatures
Daniel Bleichenbacher
Ueli Maurer
1994
CRYPTO
Fast Generation of Provable Primes Using Search in Arithmetic Progressions
Preda Mihailescu
1994
CRYPTO
Hashing with $SL_2$
Jean-Pierre Tillich
Gilles Zémor
1994
CRYPTO
Incremental Cryptography: The Case of Hashing and Signing
Mihir Bellare
Oded Goldreich
Shafi Goldwasser
1994
CRYPTO
Language Dependent Secure Bit Commitment
Toshiya Itoh
Yuji Ohta
Hiroki Shizuya
1994
CRYPTO
LFSR-based Hashing and Authentication
Hugo Krawczyk
1994
CRYPTO
Linear Cryptanalysis of the Fast Data Encipherment Algorithm
Kazuo Ohta
Kazumaro Aoki
1994
CRYPTO
Linear Cryptanalysis Using Multiple Approximations
Burton S. Kaliski Jr.
Matthew J. B. Robshaw
1994
CRYPTO
Maintaining Security in the Presence of Transient Faults
Ran Canetti
Amir Herzberg
1994
CRYPTO
More Flexible Exponentiation with Precomputation
Chae Hoon Lim
Pil Joong Lee
1994
CRYPTO
Multi-Secret Sharing Schemes
Carlo Blundo
Alfredo De Santis
Giovanni Di Crescenzo
Antonio Giorgio Gaggia
Ugo Vaccaro
1994
CRYPTO
New Bound on Authentication Code with Arbitration
Kaoru Kurosawa
1994
CRYPTO
On the Length of Cryptographic Hash-Values Used in Identification Schemes
Marc Girault
Jacques Stern
1994
CRYPTO
On the Risk of Opening Distributed Keys
Mike Burmester
1994
CRYPTO
Pitfalls in Designing Substitution Boxes (Extended Abstract)
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1994
CRYPTO
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
Ronald Cramer
Ivan Damgård
Berry Schoenmakers
1994
CRYPTO
Secure Voting Using Partially Compatible Homomorphisms
Kazue Sako
Joe Kilian
1994
CRYPTO
Securing the Information Highway
★
Invited talk
Whitfield Diffie
1994
CRYPTO
The First Experimental Cryptanalysis of the Data Encryption Standard
Mitsuru Matsui
1994
CRYPTO
The Security of Cipher Block Chaining
Mihir Bellare
Joe Kilian
Phillip Rogaway
1994
CRYPTO
Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Algorithms
Ueli Maurer
1994
CRYPTO
Tracing Traitors
Benny Chor
Amos Fiat
Moni Naor