What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1995
Year
Venue
Title
1995
CRYPTO
A Key Escrow System with Warrant Bounds
Arjen K. Lenstra
Peter Winkler
Yacov Yacobi
1995
CRYPTO
A Key-schedule Weakness in SAFER K-64
Lars R. Knudsen
1995
CRYPTO
A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems
Silvio Micali
Ray Sidney
1995
CRYPTO
Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings
1995
CRYPTO
An Efficient Divisible Electronic Cash Scheme
Tatsuaki Okamoto
1995
CRYPTO
Bucket Hashing and its Application to Fast Message Authentication
Phillip Rogaway
1995
CRYPTO
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
Dan Boneh
James Shaw
1995
CRYPTO
Committed Oblivious Transfer and Private Multi-Party Computation
Claude Crépeau
Jeroen van de Graaf
Alain Tapp
1995
CRYPTO
Cryptoanalysis Based on 2-Adic Rational Approximation
Andrew Klapper
Mark Goresky
1995
CRYPTO
Cryptoanalysis of the Immunized LL Public Key Systems
Yair Frankel
Moti Yung
1995
CRYPTO
Cryptoanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88
Jacques Patarin
1995
CRYPTO
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver
Shai Halevi
1995
CRYPTO
Escrow Encryption Systems Visited: Attacks, Analysis and Designs
Yair Frankel
Moti Yung
1995
CRYPTO
Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract)
Joe Kilian
Frank Thomson Leighton
1995
CRYPTO
Fast Key Exchange with Elliptic Curve Systems
Richard Schroeppel
Hilarie K. Orman
Sean W. O'Malley
Oliver Spatscheck
1995
CRYPTO
Fast Server-Aided RSA Signatures Secure Against Active Attacks
Philippe Béguin
Jean-Jacques Quisquater
1995
CRYPTO
General Perfect Secret Sharing Schemes
G. R. Blakley
Gregory Kabatianskii
1995
CRYPTO
Honest Verifier vs Dishonest Verifier in Public Cain Zero-Knowledge Proofs
Ivan Damgård
Oded Goldreich
Tatsuaki Okamoto
Avi Wigderson
1995
CRYPTO
How to Break Shamir's Asymmetric Basis
Thorsten Theobald
1995
CRYPTO
Improved Efficient Arguments (Preliminary Version)
Joe Kilian
1995
CRYPTO
Improving the Search Algorithm for the Best Linear Expression
Kazuo Ohta
Shiho Moriai
Kazumaro Aoki
1995
CRYPTO
MDx-MAC and Building Fast MACs from Hash Functions
Bart Preneel
Paul C. van Oorschot
1995
CRYPTO
NFS with Four Large Primes: An Explosive Experiment
Bruce Dodson
Arjen K. Lenstra
1995
CRYPTO
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm
Burton S. Kaliski Jr.
Yiqun Lisa Yin
1995
CRYPTO
On the Security of the Gollmann Cascades
Sangjoon Park
Sangjin Lee
Seung-Cheol Goh
1995
CRYPTO
On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols
Dominic Mayers
1995
CRYPTO
Precomputing Oblivious Transfer
Donald Beaver
1995
CRYPTO
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Amir Herzberg
Stanislaw Jarecki
Hugo Krawczyk
Moti Yung
1995
CRYPTO
Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract)
Dan Boneh
Richard J. Lipton
1995
CRYPTO
Robustness Principles for Public Key Protocols
Ross J. Anderson
Roger M. Needham
1995
CRYPTO
Secret Sharing with Public Reconstruction (Extended Abstract)
Amos Beimel
Benny Chor
1995
CRYPTO
Secure Signature Schemes based on Interactive Protocols
Ronald Cramer
Ivan Damgård
1995
CRYPTO
Security and Performance of Server-Aided RSA Computation Protocols
Chae Hoon Lim
Pil Joong Lee
1995
CRYPTO
Some Remarks on Lucas-Based Cryptosystems
Daniel Bleichenbacher
Wieb Bosma
Arjen K. Lenstra
1995
CRYPTO
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes
Kaoru Kurosawa
Satoshi Obana
Wakaha Ogata
1995
CRYPTO
Threshold DSS Signatures without a Trusted Party
Susan K. Langford
1995
CRYPTO
Ways of Losing Information
★
Invited talk
Robert Morris, Sr
1995
CRYPTO
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
Mihir Bellare
Roch Guérin
Phillip Rogaway