Handbook of Applied Cryptography
暂无分享,去创建一个
Alfred Menezes | Paul C. van Oorschot | Scott A. Vanstone | P. V. Oorschot | A. Menezes | S. Vanstone
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[2] Proceedings of the Cambridge Philosophical Society , 2022 .
[3] F. N. Cole. On the factoring of large numbers , 1903 .
[4] Lester S. Hill. Cryptography in An Algebraic Alphabet , 1929 .
[5] D. H. Lehmer. Euclid's Algorithm for Large Numbers , 1938 .
[6] A. Mood. The Distribution Theory of Runs , 1940 .
[7] F. S.,et al. A Mathematician's Apology , 1941, Nature.
[8] E. T.. An Introduction to the Theory of Numbers , 1946, Nature.
[9] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[10] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[11] Andrew D. Booth,et al. A SIGNED BINARY MULTIPLICATION TECHNIQUE , 1951 .
[12] N. Ankeny. The least quadratic non residue , 1952 .
[13] I. Good. The serial test for sampling numbers and other tests for randomness , 1953, Mathematical Proceedings of the Cambridge Philosophical Society.
[14] M. Kendall. Probability and Statistical Inference , 1956, Nature.
[15] H. F. Gaines,et al. Cryptanalysis: A Study of Ciphers and Their Solution , 1956 .
[16] H. Garner. The residue number system , 1959, IRE-AIEE-ACM '59 (Western).
[17] George W. Reitwiesner,et al. Binary Arithmetic , 1960, Adv. Comput..
[18] J. Rosser,et al. Approximate formulas for some functions of prime numbers , 1962 .
[19] Anatolij A. Karatsuba,et al. Multiplication of Multidigit Numbers on Automata , 1963 .
[20] Per Martin-Löf,et al. The Definition of Random Sequences , 1966, Inf. Control..
[21] Gregory J. Chaitin,et al. On the Length of Programs for Computing Finite Binary Sequences , 1966, JACM.
[22] E. Edwards.. Communication theory. , 1967, Ergonomics.
[23] E. Berlekamp. Factoring polynomials over finite fields , 1967 .
[24] J. Stein. Computational problems associated with Racah algebra , 1967 .
[25] A. E. Western,et al. Tables of indices and primitive roots , 1968 .
[26] H. Davenport. Bases for Finite Fields , 1968 .
[27] Donald E. Knuth,et al. The Art of Computer Programming, Volume I: Fundamental Algorithms, 2nd Edition , 1997 .
[28] Abraham Sinkov,et al. Elementary Cryptanalysis: A Mathematical Approach , 1970 .
[29] Neal Zierler,et al. On Primitive Trinomials (Mod 2) , 1968, Inf. Control..
[30] Neal Zierler,et al. Primitive Trinomials Whose Degree is a Mersenne Exponent , 1969, Inf. Control..
[31] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[32] P. Elias. The Efficient Construction of an Unbiased Random Sequence , 1972 .
[33] Wayne Stahnke. Primitive binary polynomials , 1973 .
[34] Lance J. Hoffman,et al. Modern methods for computer security and privacy , 1973 .
[35] Miss A.O. Penney. (b) , 1974, The New Yale Book of Quotations.
[36] Edwin Weiss,et al. A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.
[37] F. MacWilliams,et al. Codes which detect deception , 1974 .
[38] J. M. Pollard,et al. Theorems on factorization and primality testing , 1974, Mathematical Proceedings of the Cambridge Philosophical Society.
[39] George B. Purdy,et al. A high security log-in procedure , 1974, Commun. ACM.
[40] Wayne G. Barker. Cryptanalysis of the Hagelin cryptograph , 1975 .
[41] Arnold Schönhage. A Lower Bound for the Length of Addition Chains , 1975, Theor. Comput. Sci..
[42] Vaughan R. Pratt,et al. Every Prime has a Succinct Certificate , 1975, SIAM J. Comput..
[43] Encryption Protection in Computer Data Communications , 1975 .
[44] D. H. Lehmer,et al. New primality criteria and factorizations of 2^{}±1 , 1975 .
[45] J. Brillhart,et al. A method of factoring and the factorization of , 1975 .
[46] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[47] J.L. Smith,et al. Some cryptographic techniques for machine-to-machine data communications , 1975, Proceedings of the IEEE.
[48] Whitfield Diffie,et al. Multiuser cryptographic techniques , 1976, AFIPS '76.
[49] Gary L. Miller. Riemann's Hypothesis and Tests for Primality , 1976, J. Comput. Syst. Sci..
[50] J. Gordon. Very simple method to find the minimum polynomial of an arbitrary nonzero element of a finite field , 1976 .
[51] S. Kent. ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION , 1976 .
[52] Donald E. Knuth,et al. Analysis of a Simple Factorization Algorithm , 1976, Theor. Comput. Sci..
[53] Abraham Lempel,et al. On the Complexity of Finite Sequences , 1976, IEEE Trans. Inf. Theory.
[54] Andrew Chi-Chih Yao,et al. On the Evaluation of Powers , 1976, SIAM J. Comput..
[55] Edwin L. Key,et al. An analysis of the structure and complexity of nonlinear binary sequence generators , 1976, IEEE Trans. Inf. Theory.
[56] Vera Pless,et al. Encryption Schemes for Computer Confidentiality , 1977, IEEE Transactions on Computers.
[57] Martin E. Hellman,et al. An extension of the Shannon theory approach to cryptography , 1977, IEEE Trans. Inf. Theory.
[58] Volker Strassen,et al. A Fast Monte-Carlo Test for Primality , 1977, SIAM J. Comput..
[59] David Y. Y. Yun. Fast Algorithm for Rational Function Integration , 1977, IFIP Congress.
[60] Jason Gait,et al. A New Nonlinear Pseudorandom Number Generator , 1977, IEEE Transactions on Software Engineering.
[61] Chung-Kwong Yuen. Testing Random Number Generators by Walsh Transform , 1977, IEEE Transactions on Computers.
[62] Stephen M. Matyas,et al. A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard , 1978, IBM Syst. J..
[63] Thomas M. Cover,et al. A convergent gambling estimate of the entropy of English , 1978, IEEE Trans. Inf. Theory.
[64] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[65] Donald E. Knuth,et al. The art of computer programming: V.1.: Fundamental algorithms , 1997 .
[66] P. J. Green,et al. Probability and Statistical Inference , 1978 .
[67] M. Newman,et al. Topics in Algebra , 1978 .
[68] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[69] Adi Shamir. A Fast Signature Scheme , 1978 .
[70] C. Campbell. Design and specification of cryptographic capabilities , 1978, IEEE Communications Society Magazine.
[71] A. Shimizu,et al. Fast data encipherment algorithm FEAL-8 , 1978 .
[72] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[73] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[74] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[75] G. Blakley,et al. Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages , 1979 .
[76] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[77] Frank Rubin,et al. Decrypting a Stream Cipher Based on J-K Flop-Flops , 1979, IEEE Trans. Computers.
[78] John B. Kam,et al. Structured Design of Substitution-Permutation Encryption Networks , 1979, IEEE Transactions on Computers.
[79] Stephen M. Matyas. Digital Signatures - An Overview , 1979, Comput. Networks.
[80] Gideon Yuval,et al. How to Swindle Rabin , 1979, Cryptologia.
[81] Gerald J. Popek,et al. Encryption and Secure Computer Networks , 1979, CSUR.
[82] Donald R. Smith,et al. Universal fixed messages and the Rivest-Shamir-Adleman cryptosystem , 1979 .
[83] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[84] Leonard M. Adleman,et al. A subexponential algorithm for the discrete logarithm problem with applications to cryptography , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[85] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[86] Hugh C. Williams,et al. A modification of the RSA public-key encryption procedure (Corresp.) , 1980, IEEE Trans. Inf. Theory.
[87] Richard P. Brent,et al. An improved Monte Carlo factorization algorithm , 1980 .
[88] Yacov Yacobi,et al. Cryptocomplexity and NP-Completeness , 1980, ICALP.
[89] Earl E. Swartzlander,et al. Computer Arithmetic , 1980 .
[90] Louis Monier,et al. Evaluation and Comparison of Two Efficient Probabilistic Primality Testing Algorithms , 1980, Theor. Comput. Sci..
[91] J. D. Lipson. Elements of algebra and algebraic computing , 1981 .
[92] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[93] Danny Dolev,et al. On the Security of Public Key Protocols (Extended Abstract) , 1981, FOCS.
[94] J. Dixon. Asymptotically fast factorization of integers , 1981 .
[95] Frank Rubin,et al. Decrypting a Stream Cipher Based on j-k Flip-Flops , 1981, Cryptologia.
[96] Michael Ben-Or,et al. Probabilistic algorithms in finite fields , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[97] Jorge Olivos. On Vectorial Addition Chains , 1981, J. Algorithms.
[98] M. Smid. Integrating the Data Encryption Standard into Computer Networks , 1981, IEEE Trans. Commun..
[99] R. Brent,et al. Factorization of the eighth Fermat number , 1981 .
[100] D. Cantor,et al. A new algorithm for factoring polynomials over finite fields , 1981 .
[101] Peter J. Downey,et al. Computing Sequences with Addition Chains , 1981, SIAM J. Comput..
[102] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[103] Justin M. Reyneri,et al. Fast Computation of Discrete Logarithms in GF(q) , 1982, CRYPTO.
[104] Manuel Blum,et al. How to Generate Cryptographically Strong Sequences of Pseudo Random Bits , 1982, FOCS.
[105] S. M. Jennings,et al. Multiplexed Sequences: Some Properties of the Minimum Polynomial , 1982, EUROCRYPT.
[106] Ronald L. Rivest,et al. Randomized Encryption Techniques , 1982, CRYPTO.
[107] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[108] Richard G. Larson,et al. On a Primality Test of Solovay and Strassen , 1982, SIAM J. Comput..
[109] J. Boyar. Inferring a Sequence Generated by a Linear Congruence , 1982, FOCS.
[110] Henry Beker,et al. Cipher Systems: The Protection of Communications , 1982 .
[111] Rolf Blom,et al. Non-Public Key Distribution , 1982, CRYPTO.
[112] Donald W. Davies,et al. The average Cycle size of the Key-Stream in Output Feedback Encipherment , 1982, EUROCRYPT.
[113] Andrew Chi-Chih Yao,et al. The Complexity of Finding Cycles in Periodic Functions , 1982, SIAM J. Comput..
[114] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[115] R. R. Jueneman,et al. Analysis of Certain Aspects of Output Feedback Mode , 1982, CRYPTO.
[116] Manuel Blum,et al. Comparison of Two Pseudo-Random Number Generators , 1982, CRYPTO.
[117] Donald W. Davies. Some Regular Properties of the 'Data Encryption Standard' Algorithm , 1982, CRYPTO.
[118] Michael Rosen,et al. A classical introduction to modern number theory , 1982, Graduate texts in mathematics.
[119] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.
[120] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[121] Shu Lin,et al. Error control coding : fundamentals and applications , 1983 .
[122] P. Erdös,et al. On a problem of Oppenheim concerning “factorisatio numerorum” , 1983 .
[123] Jack B. Dennis,et al. Programming semantics for multiprogrammed computations , 1966, CACM.
[124] Rudolf Lidl,et al. Permutation Polynomials in RSA-Cryptosystems , 1983, CRYPTO.
[125] Thomas A. Berson,et al. A key distribution protocol using event markers , 1983, TOCS.
[126] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[127] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[128] David S. Johnson. The NP-Completeness Column: An Ongoing Guide , 1983, J. Algorithms.
[129] L. Adleman,et al. On distinguishing prime numbers from composite numbers , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).
[130] Gustavus J. Simmons,et al. A "Weak" Privacy Protocol using the RSA Crypto Algorithm , 1983, Cryptologia.
[131] Rudolf Lide,et al. Finite fields , 1983 .
[132] Richard A. Games,et al. A fast algorithm for determining the complexity of a binary sequence with period 2n , 1983, IEEE Trans. Inf. Theory.
[133] Stephen M. Matyas,et al. Message Authentication with Manipulation Detection Code , 1983, 1983 IEEE Symposium on Security and Privacy.
[134] Stephen T. Kent,et al. Security Mechanisms in High-Level Network Protocols , 1983, CSUR.
[135] J. Gerver. Factoring large numbers with a quadratic sieve , 1983 .
[136] Selim G. Akl,et al. On the Security of Compressed Encodings , 1983, CRYPTO.
[137] Jeffrey C. Lagarias,et al. Knapsack Public Key Cryptosystems and Diophantine Approximation , 1983, CRYPTO.
[138] S. Vanstone,et al. Computing Logarithms in Finite Fields of Characteristic Two , 1984 .
[139] Vijay V. Vazirani,et al. Efficient and Secure Pseudo-Random Number Generation (Extended Abstract) , 1984, FOCS.
[140] Adi Shamir,et al. An efficient signature scheme based on quadratic equations , 1984, STOC '84.
[141] Ronald L. Rivest,et al. A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields , 1984, CRYPTO.
[142] R. C. Fairfield,et al. An LSI Random Number Generator (RNG) , 1985, CRYPTO.
[143] Don Coppersmith,et al. Fast evaluation of logarithms in fields of characteristic two , 1984, IEEE Trans. Inf. Theory.
[144] John M. DeLaurentis,et al. A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm , 1984, Cryptologia.
[145] Robert S. Winternitz. A Secure One-Way Hash Function Built from DES , 1984, 1984 IEEE Symposium on Security and Privacy.
[146] Manuel Blum,et al. Independent unbiased coin flips from a correlated biased source—A finite state markov chain , 1984, Comb..
[147] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[148] Adi Shamir,et al. How to expose an eavesdropper , 1984, CACM.
[149] W E Madryga,et al. A high performance encryption algorithm , 1984 .
[150] Thomas Siegenthaler,et al. Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.
[151] Andrew M. Odlyzko,et al. Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir's fast signature scheme , 1984, IEEE Trans. Inf. Theory.
[152] Rainer A. Rueppel,et al. Linear Ciphers and Random Sequence Generators with Multiple Clocks , 1985, EUROCRYPT.
[153] E. Bach. Discrete Logarithms and Factoring , 1984 .
[154] A. Taher. Cryptography and logarithms over finite fields , 1984 .
[155] Michael Walker,et al. Key Management for Secure Electronic Funds Transfer in a Retail Environment , 1985, CRYPTO.
[156] Manuel Blum,et al. An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information , 1985, CRYPTO.
[157] Silvio Micali,et al. A "Paradoxical" Solution to the Signature Problem (Extended Abstract) , 1984, FOCS.
[158] Herbert S. Wilf,et al. Backtrack: An O(1) Expected Time Algorithm for the Graph Coloring Problem , 1984, Inf. Process. Lett..
[159] Jack Levine. Corrections for Published Copy of United States Cryptographic patents: 1861-1981 , 1984, Cryptologia.
[160] Norman Proctor,et al. A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation , 1985, CRYPTO.
[161] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[162] Gustavus J. Simmons,et al. Status report on factoring (at the Sandia National Labs) , 1985 .
[163] René Peralta,et al. Simultaneous Security of Bits in the Discrete Log , 1985, EUROCRYPT.
[164] Abraham Bookstein,et al. Cryptography: A new dimension in computer data security ? and ?. Wiley-Interscience, New York (1982). xxi + 775 pp., $43.95. ISBN 0471-04892-5. , 1985 .
[165] László Babai,et al. Trading group theory for randomness , 1985, STOC '85.
[166] Charles Cresson Wood,et al. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.
[167] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[168] B. S. Adiga,et al. Fast algorithms for implementing RSA public key cryptosystem , 1985 .
[169] Yvo Desmedt,et al. A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes , 1986, CRYPTO.
[170] A. K. Lenstra,et al. Implementation of a New Primality Test , 1985 .
[171] D. Gollman. Pseudo random properties of cascade connections of clock controlled shift registers , 1985 .
[172] Ernest F. Brickell,et al. An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi , 1985, CRYPTO.
[173] Stephen Wolfram. Cryptography with Cellular Automata , 1985, CRYPTO.
[174] Oded Goldreich,et al. On the power of cascade ciphers , 1985, TOCS.
[175] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[176] Winfried B. Müller,et al. Cryptanalysis of the Dickson Scheme , 1985, EUROCRYPT.
[177] Leonid A. Levin,et al. One-way functions and pseudorandom generators , 1985, STOC '85.
[178] Jeffrey Shallit,et al. Factoring with cyclotomic polynomials , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[179] Gary L. Miller,et al. Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields , 1986, CRYPTO.
[180] Friedrich Otto,et al. The Verifiability of Two-Party Protocols , 1985, EUROCRYPT.
[181] Graham H. Norton. Extending the Binary GCD Algorithm , 1985, AAECC.
[182] David Chaum,et al. Attacks on Some RSA Signatures , 1985, CRYPTO.
[183] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[184] Tatsuski Okamoto,et al. A Fast Signature Scheme Based on Quadratic Inequalities , 1985, 1985 IEEE Symposium on Security and Privacy.
[185] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[186] Yvo Desmedt,et al. Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences , 1985, CRYPTO.
[187] Paul Barrett,et al. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.
[188] Zongduo Dai. Proof of Rueppel's linear complexity conjecture , 1986, IEEE Trans. Inf. Theory.
[189] H. W. Lenstra,et al. Factoring integers with elliptic curves , 1987 .
[190] Joe Kilian,et al. Almost all primes can be quickly certified , 1986, STOC '86.
[191] John Shawe-Taylor,et al. Generating strong primes , 1986 .
[192] P. Erdös,et al. On the number of false witnesses for a composite number , 1986 .
[193] Douglas H. Wiedemann. Solving sparse linear equations over finite fields , 1986, IEEE Trans. Inf. Theory.
[194] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[195] David S. Johnson. The NP-Completeness Column: An Ongoing Guide , 1986, J. Algorithms.
[196] Evangelos Kranakis. Primality and cryptography , 1986, Wiley-Teubner series in computer science.
[197] David Chaum,et al. Demonstrating Possession of a Discrete Logarithm Without Revealing It , 1986, CRYPTO.
[198] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[199] Michel Ugon,et al. Smart Card, a Highly Reliable and Portable Security Device , 1986, CRYPTO.
[200] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[201] Oded Goldreich,et al. Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme , 1986, CRYPTO.
[202] Gilles Brassard,et al. Zero-Knowledge Simulation of Boolean Circuits , 1986, CRYPTO.
[203] Michael Luby,et al. Pseudo-random permutation generators and cryptographic composition , 1986, STOC '86.
[204] Rainer A. Rueppel,et al. Products of linear recurring sequences with maximum complexity , 1987, IEEE Trans. Inf. Theory.
[205] Christoph Günther,et al. Alternating Step Generators Controlled by De Bruijn Sequences , 1987, EUROCRYPT.
[206] Ivan Damgård,et al. Collision Free Hash Functions and Public Key Signature Schemes , 1987, EUROCRYPT.
[207] H. Lenstra,et al. Primitive normal bases for finite fields , 1987 .
[208] Martin Tompa,et al. Random self-reducibility and zero knowledge interactive proofs of possession of information , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[209] Samy Bengio,et al. Special Uses and Abuses of the Fiat-Shamir Passport Protocol , 1987, CRYPTO.
[210] Tatsuaki Okamoto. A single public-key authentication scheme for multiple users , 1987, Systems and Computers in Japan.
[211] Robert D. Silverman. The multiple polynomial quadratic sieve , 1987 .
[212] Ernest F. Brickell,et al. Secure Audio Teleconference , 1987, CRYPTO.
[213] M. Kimberley. Comparison of two statistical tests for keystream sequences , 1987 .
[214] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[215] Hideki Imai,et al. On the Key Predistribution System: A Practical Solution to the Key Distribution Problem , 1987, CRYPTO.
[216] Claus-Peter Schnorr,et al. An efficient solution of the congruence x2+ky2=mpmod{n} , 1987, IEEE Trans. Inf. Theory.
[217] Silvio Micali,et al. Non-Interactive Zero-Knowledge Proof Systems , 1987, CRYPTO.
[218] David Chaum,et al. An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations , 1987, EUROCRYPT.
[219] Xuejia Lai,et al. Condition for the nonsingularity of a feedback shift-register over a general finite field , 1987, IEEE Trans. Inf. Theory.
[220] Leonard M. Adleman,et al. Open Problems in Number Theoretic Complexity , 1987 .
[221] Heather Woll,et al. Reductions among Number Theoretic Problems , 1987, Inf. Comput..
[222] 조위덕. Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.
[223] Gustavus J. Simmons,et al. Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys , 1987, IEEE Transactions on Software Engineering.
[224] John Linn,et al. Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures , 1989, RFC.
[225] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[226] Richard E. Blahut,et al. Principles and practice of information theory , 1987 .
[227] Gordon B. Agnew,et al. Random Sources for Cryptographic Systems , 1987, EUROCRYPT.
[228] Frank A. Feldman. Fast Spectral Tests for Measuring Nonrandomness and the DES , 1987, CRYPTO.
[229] Marc Girault,et al. Hash-Functions Using Modulo-N Operations , 1987, EUROCRYPT.
[230] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[231] Jacques Stern,et al. Secret linear congruential generators are not cryptographically secure , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[232] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[233] Jeroen van de Graaf,et al. A Simple and Secure Way to Show the Validity of Your Public Key , 1987, CRYPTO.
[234] Ernest F. Brickell,et al. An Observation on the Security of McEliece's Public-Key Cryptosystem , 1988, EUROCRYPT.
[235] Harald Niederreiter,et al. The Probabilistic Theory of Linear Complexity , 1988, EUROCRYPT.
[236] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[237] W. G. Chambers. Clock-controlled shift registers in binary sequence generators , 1988 .
[238] Thomas Beth,et al. Efficient Zero-Knowledge Identification Scheme for Smart Cards , 1988, EUROCRYPT.
[239] J. H. Moore. Protocol failures in cryptosystems , 1988, Proc. IEEE.
[240] László Babai,et al. Arthur-Merlin Games: A Randomized Proof System, and a Hierarchy of Complexity Classes , 1988, J. Comput. Syst. Sci..
[241] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[242] Marc Girault,et al. A Generalized Birthday Attack , 1988, EUROCRYPT.
[243] Hugo Krawczyk,et al. On the existence of pseudorandom generators , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[244] Johan Håstad,et al. Solving Simultaneous Modular Equations of Low Degree , 1988, SIAM J. Comput..
[245] Kaoru Kurosawa,et al. Public Key Cryptosystem using a reciprocal number with the same Intractability as Factoring a Large number , 1983, Cryptologia.
[246] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[247] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[248] Bert den Boer. Cryptanalysis of F.E.A.L , 1988, EUROCRYPT.
[249] Kencheng Zeng,et al. On the Linear Syndrome Method in Cryptanalysis , 1988, CRYPTO.
[250] Silvio Micali,et al. How To Sign Given Any Trapdoor Function , 1988, CRYPTO.
[251] Whitfield Diffie. The first ten years of public-key cryptography , 1988 .
[252] Alan M. Frieze,et al. Reconstructing Truncated Integer Variables Satisfying Linear Congruences , 1988, SIAM J. Comput..
[253] Dominic J. A. Welsh,et al. Codes and cryptography , 1988 .
[254] E. Brickell,et al. Cryptanalysis: a survey of recent results , 1988, Proc. IEEE.
[255] Silvio Micali,et al. The Notion of Security for Probabilistic Cryptosystems , 1986, CRYPTO.
[256] Whitfield Diffie,et al. A Secure Audio Teleconference System , 1988, CRYPTO.
[257] Avi Wigderson,et al. The Discrete Logarithm Hides O(log n) Bits , 1988, SIAM J. Comput..
[258] Adi Shamir,et al. An Improvement of the Fiat-Shamir Identification and Signature Scheme , 1988, CRYPTO.
[259] Victor Shoup,et al. New algorithms for finding irreducible polynomials over finite fields , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[260] K. Ohta,et al. Practical extension of Fiat-Shamir scheme , 1988 .
[261] Hans-Joachim Knobloch,et al. A Smart Card Implementation of the Fiat-Shamir Identification Scheme , 1988, EUROCRYPT.
[262] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[263] Ueli Maurer,et al. Perfect Local Randomness in Pseudo-Random Sequences , 1989, CRYPTO.
[264] Frans M. J. Willems,et al. Universal data compression and repetition times , 1989, IEEE Trans. Inf. Theory.
[265] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[266] David C. Feldmeier,et al. UNIX Password Security - Ten Years Later , 1989, CRYPTO.
[267] Ronald C. Mullin,et al. Optimal normal bases in GF(pn) , 1989, Discret. Appl. Math..
[268] Jean-Jacques Quisquater,et al. How Easy is Collision Search? Application to DES (Extended Summary) , 1990, EUROCRYPT.
[269] Réjane Forré,et al. A Fats Correlation Attack on Nonlinearly Feedforward Filtered Shift-Register Sequences , 1990, EUROCRYPT.
[270] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[271] C. Mitchell,et al. Minimum weight modified signed-digit representations and fast exponentiation , 1989 .
[272] James Lee Hafner,et al. On the Distribution of Running Times of Certain Integer Factoring Algorithms , 1989, J. Algorithms.
[273] Jerome H. Saltzer,et al. Reducing risks from poorly chosen keys , 1989, SOSP '89.
[274] C. Pomerance,et al. The probability that a random probable prime is composite , 1989 .
[275] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[276] James L. Massey,et al. An Information-Theoretic Treatment of Homophonic Substitution , 1990, EUROCRYPT.
[277] Ueli Maurer,et al. Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity , 1990, EUROCRYPT.
[278] Eiji Okamoto,et al. Key distribution system based on identification information , 1989, IEEE J. Sel. Areas Commun..
[279] Philippe Flajolet,et al. Random Mapping Statistics , 1990, EUROCRYPT.
[280] Hans-Joachim Knobloch,et al. How to Keep Authenticity Alive in a Computer Network , 1990, EUROCRYPT.
[281] Thomas Beth,et al. On the Complexity of Pseudo-Random Sequences - Or: If You Can Describe a Sequence It Can't be Random , 1990, EUROCRYPT.
[282] Chi-Sung Laih,et al. Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space , 1989, CRYPTO.
[283] Matthijs J. Coster,et al. Addition Chain Heuristics , 1989, CRYPTO.
[284] John T. Kohl. The use of Encryption in Kerberos for Network Authentication , 1989, CRYPTO.
[285] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[286] Arjen K. Lenstra,et al. Factoring by Electronic Mail , 1990, EUROCRYPT.
[287] L. Gong,et al. Using one-way functions for authentication , 1989, CCRV.
[288] Natsume Matsuzaki,et al. Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.
[289] Moni Naor,et al. Efficient cryptographic schemes provably as secure as subset sum , 1989, 30th Annual Symposium on Foundations of Computer Science.
[290] Chung-Huang Yang,et al. On the Linear Consistency Test (LCT) in Cryptanalysis with Applications , 1989, CRYPTO.
[291] Y. Desmedt,et al. Remarks on soundness of proofs (zero-knowledge schemes) , 1989 .
[292] Jean-Jacques Quisquater,et al. 2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms , 1990, EUROCRYPT.
[293] Silvio Micali,et al. On-Line/Off-Line Digital Schemes , 1989, CRYPTO.
[294] Michaël Quisquater,et al. How to Explain Zero-Knowledge Protocols to Your Children , 1989, CRYPTO.
[295] John Linn,et al. Privacy enhancement for Internet electronic mail: Part III - algorithms, modes, and identifiers , 1989, RFC.
[296] Yacov Yacobi,et al. On Key Distribution Systems , 1989, CRYPTO.
[297] Dieter Gollmann,et al. Clock-controlled shift registers: a review , 1989, IEEE J. Sel. Areas Commun..
[298] David M. Bressoud. Factorization and Primality Testing , 1989 .
[299] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[300] J. Olivos,et al. Speeding up the computations on an elliptic curve using addition-subtraction chains , 1990, RAIRO Theor. Informatics Appl..
[301] S. Vanstone,et al. Improved digital signature scheme based on discrete exponentiation , 1990 .
[302] S. Goldwasser. The Search for Provably Secure Cryptosystems , 1990 .
[303] Jean-Jacques Quisquater,et al. Better Login Protocols for Computer Networks , 1990, ESORICS.
[304] Gustavus J. Simmons,et al. A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party , 1991, EUROCRYPT.
[305] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[306] Paul C. van Oorschot,et al. A Known Plaintext Attack on Two-Key Triple Encryption , 1991, EUROCRYPT.
[307] Xuejia Lai,et al. A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.
[308] Shoji Miyaguchi,et al. The FEAL Cipher Family , 1990, CRYPTO.
[309] Burton S. Kaliski,et al. A Cryptographic Library for the Motorola DSP56000 , 1991, EUROCRYPT.
[310] Jovan Dj. Golic,et al. A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence , 1990, AUSCRYPT.
[311] Willi Meier,et al. Cryptographic Significance of the Carry for Ciphers Based on Integer Addition , 1990, CRYPTO.
[312] Claus-Peter Schnorr,et al. Fast Signature Generation With a Fiat Shamir-Like Scheme , 1991, EUROCRYPT.
[313] Hugo Krawczyk,et al. On the Composition of Zero-Knowledge Proof Systems , 1990, ICALP.
[314] Adi Shamir,et al. Witness indistinguishable and witness hiding protocols , 1990, STOC '90.
[315] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[316] Paul C. van Oorschot. A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms , 1990, CRYPTO.
[317] Robert D. Silverman,et al. AN FFT EXTENSION TO THE P - 1 FACTORING ALGORITHM , 1990 .
[318] Yacov Yacobi. A Key Distribution "Paradox" , 1990, CRYPTO.
[319] Walter Fumy,et al. A Modular Approach to Key Distribution , 1990, CRYPTO.
[320] Jennifer Seberry,et al. LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications , 1990, AUSCRYPT.
[321] David Chaum,et al. Convertible Undeniable Signatures , 1990, CRYPTO.
[322] Henri Gilbert,et al. A Statistical Attack of the FEAL-8 Cryptosystem , 1990, CRYPTO.
[323] Moti Yung,et al. On the Design of Provably Secure Cryptographic Hash Functions , 1991, EUROCRYPT.
[324] Adi Shamir,et al. On the Universality of the Next Bit Test , 1990, CRYPTO.
[325] Michael J. Wiener,et al. Cryptanalysis of Short RSA Secret Exponents (Abstract) , 1990, EUROCRYPT.
[326] François Morain,et al. Distributed Primality Proving and the Primality of (23539+1)/3 , 1991, EUROCRYPT.
[327] Johannes A. Buchmann,et al. On the Computation of Discrete Logarithms in Class Groups , 1990, CRYPTO.
[328] Cees J. A. Jansen,et al. On the Significance of the Directed Acyclic Word Graph in Cryptology , 1990, AUSCRYPT.
[329] Chris Mitchell,et al. Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.
[330] Jeffrey Shallit,et al. On the Worst Case of Three Algorithms for Computing the Jacobi Symbol , 1990, J. Symb. Comput..
[331] J. K. Gibson. Some comments on Damgard's hashing principle , 1990 .
[332] Don Davis,et al. Network security via private-key certificates , 1990, OPSR.
[333] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[334] Chung-wu Ho,et al. A Fast Algorithm of the Chinese Remainder Theorem and ITS Application to Fibonacci Numbers , 1991 .
[335] Chung-Huang Yang,et al. Pseudorandom bit generators in stream-cipher cryptography , 1991, Computer.
[336] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[337] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[338] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[339] David Chaum,et al. Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer , 1991, CRYPTO.
[340] Valery I. Korzhik,et al. Cryptanalysis of McEliece's Public-Key Cryptosystem , 1991, EUROCRYPT.
[341] Amos Fiat,et al. Rigorous time/space tradeoffs for inverting functions , 1991, STOC '91.
[342] Bruce W. Char,et al. Maple V Library Reference Manual , 1992, Springer New York.
[343] Ernst M. Gabidulin,et al. Ideals over a Non-Commutative Ring and thier Applications in Cryptology , 1991, EUROCRYPT.
[344] Colin D. Walter. Faster Modular Multiplication by Operand Scaling , 1991, CRYPTO.
[345] Atsushi Fujioka,et al. ESIGN: An Efficient Digital Signature Implementation for Smard Cards , 1991, EUROCRYPT.
[346] Andrew M. Odlyzko,et al. Computation of discrete logarithms in prime fields , 1991, Des. Codes Cryptogr..
[347] Xuejia Lai,et al. Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.
[348] Vladimir V. Chepyzhov,et al. On A Fast Correlation Attack on Certain Stream Ciphers , 1991, EUROCRYPT.
[349] Antoon Bosselaers,et al. An Attack on the Last Two Rounds of MD4 , 1991, CRYPTO.
[350] Peter de Rooij,et al. On the Security of the Schnorr Scheme using Preprocessing , 1991, EUROCRYPT.
[351] Joos Vandewalle,et al. Cryptography Within Phase I of the EEC-RACE Programme , 1991, Computer Security and Industrial Cryptography.
[352] Li-Fung Chang,et al. Privacy and authentication on a portable communications system , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.
[353] Sibylle Mund,et al. Liv-Lempel Complexity for Periodic Sequences and its Cryptographic Application , 1991, EUROCRYPT.
[354] J.J. Tardo,et al. SPX: global authentication using public key certificates , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[355] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[356] Ivan Damgård,et al. Speeding up Prime Number Generation , 1991, ASIACRYPT.
[357] Tatsuaki Okamoto,et al. New Public-Key Schemes Based on Elliptic Curves over the Ring Zn , 1991, CRYPTO.
[358] Jinhui Chao,et al. A New ID-Based Key Sharing System , 1991, CRYPTO.
[359] Jennifer Seberry,et al. Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI , 1991, ASIACRYPT.
[360] Patrick Horster,et al. Discrete Logarithm Based Protocols , 1991, EUROCRYPT.
[361] Alain Guyot,et al. OCAPI: architecture of a VLSI coprocessor for the GCD and the extended GCD of large numbers , 1991, [1991] Proceedings 10th IEEE Symposium on Computer Arithmetic.
[362] Shimshon Berkovits,et al. How To Broadcast A Secret , 1991, EUROCRYPT.
[363] Y. Kurita,et al. Primitive t-Nomials(t=3,5)over GF(2) Whose Degree is a Mersenne Exponent≦44497 , 1991 .
[364] Li Gong,et al. Logics for cryptographic protocols-virtues and limitations , 1991, Proceedings Computer Security Foundations Workshop IV.
[365] Lars R. Knudsen,et al. Cryptanalysis of LOKI , 1991, ASIACRYPT.
[366] Miodrag V. Zivkovic. An algorithm for the initial state reconstruction of the clock-controlled shift register , 1991, IEEE Trans. Inf. Theory.
[367] Bart Preneel,et al. Standardization of Cryptographic Techniques , 1991, Computer Security and Industrial Cryptography.
[368] Henri Gilbert,et al. A Known Plaintext Attack of FEAL-4 and FEAL-6 , 1991, CRYPTO.
[369] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[370] Klaus Vedder. Security Aspects of Mobile Communications , 1991, Computer Security and Industrial Cryptography.
[371] Zongduo Dai,et al. Linear Complexity of Periodically Repeated Random Sequences , 1991, EUROCRYPT.
[372] Jennifer Seberry,et al. HAVAL - A One-Way Hashing Algorithm with Variable Length of Output , 1992, AUSCRYPT.
[373] Yvo Desmedt,et al. The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel) , 1992, EUROCRYPT.
[374] Henri Gilbert,et al. On the Security of the Permuted Kernel Identification Scheme , 1992, CRYPTO.
[375] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[376] Martín Abadi,et al. Authentication in distributed systems: theory and practice , 1991, SOSP '91.
[377] A. Menezes,et al. Applications of Finite Fields , 1992 .
[378] H. Lenstra,et al. A rigorous time bound for factoring integers , 1992 .
[379] David Chaum,et al. Provably Unforgeable Signatures , 1992, CRYPTO.
[380] Hugo Krawczyk. How to Predict Congruential Generators , 1992, J. Algorithms.
[381] Christian Waldvogel,et al. The Probability Distribution of the Diffie-Hellman Key , 1992, AUSCRYPT.
[382] Jovan Dj. Golic,et al. Correlation via Linear Sequential Circuit Approximation of Combiners with memory , 1992, EUROCRYPT.
[383] Christian Huitema,et al. Associating Metrics to Certification Paths , 1992, ESORICS.
[384] David Everett. Identity verification and biometrics , 1992 .
[385] Virgil D. Gligor,et al. On message integrity in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[386] Andrew Klapper,et al. The Vulnerability of Geometric Sequences Based on Fields on Odd Characteristic , 1992, AUSCRYPT.
[387] Alexander Russell. Necessary and Sufficient Conditions For Collision-Free Hashing , 1992, CRYPTO.
[388] G. Mullen,et al. Primitive polynomials over finite fields , 1992 .
[389] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[390] G. R. Blakley,et al. Threshold Schemes with Disenrollment , 1992, CRYPTO.
[391] Gustavus J. Simmons,et al. The Smart Card: A Standardized Security Device Dedicated to Public Cryptology , 1992 .
[392] Hans Eberle,et al. A High-Speed DES Implementation for Network Applications , 1992, CRYPTO.
[393] Ming-Deh A. Huang,et al. Primality Testing and Abelian Varieties over Finite Fields , 1992 .
[394] Michael J. Wiener,et al. DES is not a Group , 1992, CRYPTO.
[395] Kevin S. McCurley,et al. Massively Parallel Computation of Discrete Logarithms , 1992, CRYPTO.
[396] Eugène van Heyst,et al. How to Make Efficient Fail-stop Signatures , 1992, EUROCRYPT.
[397] Gene Tsudik,et al. KryptoKnight Authentication and Key Distribution System , 1992, ESORICS.
[398] Xuejia Lai,et al. A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers , 1992, AUSCRYPT.
[399] Gene Tsudik. Message authentication with one-way hash functions , 1992, CCRV.
[400] Gregory J. E. Rawlins. Compared to what? - an introduction to the analysis of algorithms , 1992, Principles of computer science series.
[401] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[402] Ivan Damgård,et al. On Generation of Probable Primes By Incremental Search , 1992, CRYPTO.
[403] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[404] Ed Dawson,et al. Cryptanalysis of Summation Generator , 1992, AUSCRYPT.
[405] Keith O. Geddes,et al. Algorithms for computer algebra , 1992 .
[406] Mitsuru Matsui,et al. A New Method for Known Plaintext Attack of FEAL Cipher , 1992, EUROCRYPT.
[407] Jürgen Schönwälder,et al. A nonce-based protocol for multiple authentications , 1992, OPSR.
[408] Mihir Bellare,et al. On Defining Proofs of Knowledge , 1992, CRYPTO.
[409] Peter C. Wayner,et al. Content-Addressable Search Engines and DES-like Systems , 1992, CRYPTO.
[410] P. Gács,et al. Algorithms , 1992 .
[411] Thomas Beth,et al. Timely Authentication in Distributed Systems , 1992, ESORICS.
[412] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[413] Daniel M. Gordon,et al. Designing and Detecting Trapdoors for Discrete Log Cryptosystems , 1992, CRYPTO.
[414] J. Couveignes. Computing a square root for the number field sieve , 1993 .
[415] Sung-Ming Yen,et al. New digital signature scheme based on discrete logarithm , 1993 .
[416] Walter Fumy,et al. Placement of Cryptographic Key Distribution Within OSI: Design Alternatives and Assessment , 1993, Comput. Networks ISDN Syst..
[417] Willi Meier,et al. On the Security of the IDEA Block Cipher , 1994, EUROCRYPT.
[418] Erich Kaltofen,et al. Analysis of Coppersmith's Block Wiedemann Algorithm for the Parallel Solution of Sparse Linear Systems , 1993, AAECC.
[419] Peter J. Smith,et al. LUC: A New Public Key System , 1993, SEC.
[420] Benjamin Arazi. Integrating a key distribution procedure into the digital signature standard , 1993 .
[421] Mark Shand,et al. Fast implementations of RSA cryptography , 1993, Proceedings of IEEE 11th Symposium on Computer Arithmetic.
[422] Alfredo De Santis,et al. Fully Dynamic Secret Sharing Schemes , 1993, Theor. Comput. Sci..
[423] B. Clifford Neuman,et al. A note on the use of timestamps as nonces , 1993, OPSR.
[424] Andreas Pfitzmann,et al. More efficient software implementations of (generalized) DES , 1993, Comput. Secur..
[425] Dj Daniel Bernstein,et al. A general number field sieve implementation , 1993 .
[426] David Naccache,et al. Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme , 1994, EUROCRYPT.
[427] Silvio Micali,et al. Secret-Key Agreement without Public-Key Cryptography , 1993, CRYPTO.
[428] D. Jungnickel. Finite fields : structure and arithmetics , 1993 .
[429] Richard G. E. Pinch. The Carmichael Numbers up to 10 15 , 1993 .
[430] Vincent Rijmen,et al. Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds , 1993, CRYPTO.
[431] G. Jaeschke. On strong pseudoprimes to several bases , 1993 .
[432] Walter Fumy,et al. Principles of Key Management , 1993, IEEE J. Sel. Areas Commun..
[433] Markus Dichtl,et al. Fish: A Fast Software Stream Cipher , 1993, FSE.
[434] Arjen K. Lenstra,et al. On the Factorization of RSA-120 , 1993, CRYPTO.
[435] Rainer A. Rueppel,et al. A new signature scheme based on the DSA giving message recovery , 1993, CCS '93.
[436] Joos Vandewalle,et al. A New Approach to Block Cipher Design , 1993, FSE.
[437] L. Adleman,et al. A Subexponential Algorithm for Discrete Logarithms over All Finite Fields , 1993, Annual International Cryptology Conference.
[438] Thomas Johansson,et al. On the Relation between A-Codes and Codes Correcting Independent Errors , 1994, EUROCRYPT.
[439] Peter Honeyman,et al. Formal Methods for the Analysis of Authentication Protocols , 1993 .
[440] David J. Wheeler. A Bulk Data Encription Algorithm , 1993, FSE.
[441] Cunsheng Ding,et al. The Differential Cryptanalysis and Design of Natural Stream Ciphers , 1993, FSE.
[442] Jerome H. Saltzer,et al. Protecting Poorly Chosen Secrets from Guessing Attacks , 1993, IEEE J. Sel. Areas Commun..
[443] Colin Boyd,et al. On a Limitation of BAN Logic , 1994, EUROCRYPT.
[444] N. Demytko,et al. A New Elliptic Curve Based Analogue of RSA , 1994, EUROCRYPT.
[445] Xuejia Lai,et al. Security of Iterated Hash Functions Based on Block Ciphers , 1994, CRYPTO.
[446] Yvo Desmedt,et al. Towards practical “proven secure” authenticated key distribution , 1993, CCS '93.
[447] Oliver Schirokauer. Discrete logarithms and local units , 1993, Philosophical Transactions of the Royal Society of London. Series A: Physical and Engineering Sciences.
[448] Adi Shamir,et al. The Discrete Logarithm Modulo a Composite Hides O(n) Bits , 1993, J. Comput. Syst. Sci..
[449] C. N. Zhang. An improved binary algorithm for RSA , 1993 .
[450] I. Damgård,et al. Average case error estimates for the strong probable prime test , 1993 .
[451] Johannes A. Buchmann,et al. An Implementation of the General Number Field Sieve , 1994, CRYPTO.
[452] Peter J. Giblin,et al. Primes and programming - an introduction to number theory with computing , 1993 .
[453] Amos Beimel,et al. Interaction in Key Distribution Schemes (Extended Abstract) , 1993, CRYPTO.
[454] Ross J. Anderson. Practical RSA trapdoor , 1993 .
[455] Jacques Patarin,et al. Improved Algorithms for the Permuted Kernel Problem , 1993, CRYPTO.
[456] C. Adams,et al. DESIGNING S-BOXES FOR CIPHERS RESISTANT TO DIFFERENTIAL CRYPTANALYSIS ( Extended , 1993 .
[457] J. Ly. A serial version of the Pohlig-Hellman Algorithm for computing discrete logarithms , 1993 .
[458] Lars R. Knudsen,et al. Attacks on Double Block Length Hash Functions , 1993, FSE.
[459] Eli Biham,et al. New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract) , 1994, EUROCRYPT.
[460] H. Lenstra,et al. Factoring integers with the number field sieve , 1993 .
[461] Tudor Jebelean. Comparing several GCD algorithms , 1993, Proceedings of IEEE 11th Symposium on Computer Arithmetic.
[462] Henri Cohen,et al. A course in computational algebraic number theory , 1993, Graduate texts in mathematics.
[463] R. Tao. On Finite Automaton One-Key Cryptosystems , 1993, FSE.
[464] Chae Hoon Lim,et al. Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks , 1993, CRYPTO.
[465] Ian F. Blake,et al. Constructive problems for irreducible polynominals over finite fields , 1993, Information Theory and Applications.
[466] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[467] A. K. Lenstra,et al. The factorization of the ninth Fermat number , 1993 .
[468] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[469] Jennifer Seberry,et al. Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks , 1993, IEEE J. Sel. Areas Commun..
[470] I. Koren. Computer arithmetic algorithms , 2018 .
[471] Armin Liebl,et al. Authentication in distributed systems: a bibliography , 1993, OPSR.
[472] Joos Vandewalle,et al. Differential cryptanalysis of hash functions based on block ciphers , 1993, CCS '93.
[473] Richard Taylor,et al. An Integrity Check Value Algorithm for Stream Ciphers , 1993, CRYPTO.
[474] A. Atkin,et al. ELLIPTIC CURVES AND PRIMALITY PROVING , 1993 .
[475] Thomas Johansson,et al. On Families of Hash Functions via Geometric Codes and Concatenation , 1993, CRYPTO.
[476] Stuart Haber,et al. Improving the Efficiency and Reliability of Digital Time-Stamping , 1993 .
[477] Jovan Dj. Golic,et al. Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers , 1994, EUROCRYPT.
[478] Mike Burmester,et al. On the Risk of Opening Distributed Keys , 1994, CRYPTO.
[479] Rainer A. Rueppel,et al. Modern key agreement techniques , 1994, Comput. Commun..
[480] Susan K. Langford,et al. Differential-Linear Cryptanalysis , 1994, CRYPTO.
[481] G. Frey,et al. A remark concerning m -divisibility and the discrete logarithm in the divisor class group of curves , 1994 .
[482] Serge Vaudenay,et al. On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER , 1994, FSE.
[483] Kazuo Ohta,et al. Linear Cryptanalysis of the Fast Data Encipherment Algorithm , 1994, CRYPTO.
[484] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[485] Warwick Ford,et al. A key distribution method for object-based protection , 1994, CCS '94.
[486] Thomas Beth,et al. Towards acceptable key escrow systems , 1994, CCS '94.
[487] Simon R. Blackburn,et al. Clock-Controlled Pseudorandom Generators on Finite Groups , 1994, FSE.
[488] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[489] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[490] Mitsuru Matsui,et al. The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.
[491] Kathleen A. S. Quinn. Some constructions for key distribution patterns , 1994, Des. Codes Cryptogr..
[492] Jonathan P. Sorenson. Two Fast GCD Algorithms , 1994, J. Algorithms.
[493] Arjen K. Lenstra,et al. The Magic Words are Squeamish Ossifrage , 1994, ASIACRYPT.
[494] Chris J. Skinner,et al. A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms , 1994, ASIACRYPT.
[495] S. Vanstone,et al. The knapsack problem in cryptography , 1994 .
[496] Jean-Jacques Quisquater,et al. Secure Acceleration of DSS Signatures Using Insecure Server , 1994, ASIACRYPT.
[497] Matthew J. B. Robshaw. On evaluating the linear complexity of a sequence of least period 2n , 1994, Des. Codes Cryptogr..
[498] Michael Roe,et al. How to Reverse Engineer an EES Device , 1994, FSE.
[499] Florent Chabaud,et al. On the Security of Some Cryptosystems Based on Error-correcting Codes , 1994, EUROCRYPT.
[500] Ilene H. Morgan,et al. Primitive normal polynomials over finite fields , 1994 .
[501] Leonard M. Adleman,et al. Open problems in number theoretic complexity, II , 1994, ANTS.
[502] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[503] Ed Dawson,et al. A computer package for measuring the strength of encryption algorithms , 1994, Comput. Secur..
[504] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[505] S. Micali. Fair cryptosystems , 1994 .
[506] M. Smid,et al. Key escrowing today , 1994, IEEE Communications Magazine.
[507] Mark Goresky,et al. Feedback Registers Based on Ramified Extensions of the 2-Adic Numbers (Extended Abstract) , 1994, EUROCRYPT.
[508] Henri Gilbert,et al. A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem , 1994, CRYPTO.
[509] James L. Massey,et al. A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences , 1994, CRYPTO.
[510] Catherine A. Meadows,et al. Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.
[511] G. A. Orton,et al. A Multiple-Iterated Trapdoor for Dense Compact Knapsacks , 1994, EUROCRYPT.
[512] Arjen K. Lenstra,et al. Lattice sieving and trial division , 1994, ANTS.
[513] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[514] Matt Blaze,et al. Protocol failure in the escrowed encryption standard , 1994, CCS '94.
[515] Mitsuru Matsui,et al. Linear Cryptanalysis of LOKI and s2DES , 1994, ASIACRYPT.
[516] Eli Biham,et al. How to Strengthen DES Using Existing Hardware , 1994, ASIACRYPT.
[517] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[518] Ross Ihaka,et al. Cryptographic Randomness from Air Turbulence in Disk Drives , 1994, CRYPTO.
[519] Preda Mihailescu,et al. Fast Generation of Provable Primes Using Search in Arithmetic Progressions , 1994, CRYPTO.
[520] Kaoru Kurosawa,et al. Low Exponent Attack Against Elliptic Curve RSA , 1994, Inf. Process. Lett..
[521] Carlo Blundo,et al. Space Requirements for Broadcast Encryption , 1994, EUROCRYPT.
[522] Claus-Peter Schnorr,et al. Lattice basis reduction: Improved practical algorithms and solving subset sum problems , 1991, FCT.
[523] K.-Y. Lam,et al. Efficiency of SS(I) square-and-multiply exponentiation algorithms , 1994 .
[524] Patrick Horster,et al. Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications , 1994, ASIACRYPT.
[525] C. Pomerance,et al. There are infinitely many Carmichael numbers , 1994 .
[526] Martín Abadi,et al. Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[527] Evangelos Kranakis,et al. On key distribution via true broadcasting , 1994, CCS '94.
[528] Jan Camenisch,et al. Blind Signatures Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.
[529] Jacques Stern,et al. On the Length of Cryptographic Hash-Values Used in Identification Schemes , 1994, CRYPTO.
[530] Leonard M. Adleman,et al. A subexponential algorithm for discrete logarithms over the rational subgroup of the jacobians of large genus hyperelliptic curves over finite fields , 1994, ANTS.
[531] Chris J. Mitchell. A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels , 1995, IMACC.
[532] Arjen K. Lenstra,et al. NFS with Four Large Primes: An Explosive Experiment , 1995, CRYPTO.
[533] Bart Preneel,et al. MDx-MAC and Building Fast MACs from Hash Functions , 1995, CRYPTO.
[534] F. Arnault. Rabin-Miller primality test: composite numbers which pass it , 1995 .
[535] Ed Dawson,et al. Randomness Measures Related to Subset Occurrence , 1995, Cryptography: Policy and Algorithms.
[536] Simon J. D. Phoenix,et al. Quantum cryptography: Protecting our future networks with quantum mechanics , 1995, Inf. Secur. Tech. Rep..
[537] Peter L. Montgomery,et al. A Block Lanczos Algorithm for Finding Dependencies Over GF(2) , 1995, EUROCRYPT.
[538] Chris J. Mitchell,et al. A Proposed Architecture for Trusted Third Party Services , 1995, Cryptography: Policy and Algorithms.
[539] Gene Tsudik,et al. Refinement and extension of encrypted key exchange , 1995, OPSR.
[540] Claus-Peter Schnorr,et al. Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction , 1995, EUROCRYPT.
[541] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[542] Kazuo Ohta,et al. Differential-Linear Cryptanalysis of FEAL-8 , 1995 .
[543] Erich Kaltofen,et al. Subquadratic-time factoring of polynomials over finite fields , 1995, STOC '95.
[544] Christian Huitema,et al. A new approach to the X.509 framework: allowing a global authentication infrastructure without a global trust model , 1995, Proceedings of the Symposium on Network and Distributed System Security.
[545] Chi-Sung Laih,et al. On the Security of the Lucas Function , 1995, Inf. Process. Lett..
[546] Matthew K. Franklin,et al. Verifiable Signature Sharing , 1995, EUROCRYPT.
[547] Ross J. Anderson,et al. Robustness Principles for Public Key Protocols , 1995, CRYPTO.
[548] Damian Weber,et al. An Implementation of the General Number Field Sieve to Compute Discrete Logarithms mod p , 1995, EUROCRYPT.
[549] Carlo Harpes,et al. A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma , 1995, EUROCRYPT.
[550] Walter T. Penzhorn,et al. Computation of Low-Weight Parity Checks for Correlation Attacks on Stream Ciphers , 1995, IMACC.
[551] Jan Camenisch,et al. Fair Blind Signatures , 1995, EUROCRYPT.
[552] David Pointcheval,et al. A New Identification Scheme Based on the Perceptrons Problem , 1995, EUROCRYPT.
[553] Peter Winkler,et al. A Key Escrow System with Warrant Bounds , 1995, CRYPTO.
[554] Sangjin Lee,et al. On the Security of the Gollmann Cascades , 1995, CRYPTO.
[555] Moti Yung,et al. Cryptanalysis of the Immunized LL Public Key Systems , 1995, CRYPTO.
[556] Jonathan P. Sorenson,et al. Counting the Integers Factorable via Cyclotomic Methods , 1995, J. Algorithms.
[557] Simon J. Shepherd. A high speed software implementation of the Data Encryption Standard , 1995, Comput. Secur..
[558] Burton S. Kaliski,et al. On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm , 1995, CRYPTO.
[559] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[560] Joe Kilian,et al. How to Protect DES Against Exhaustive Key Search , 1996, CRYPTO.
[561] Jacques Patarin,et al. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.
[562] Vincent Rijmen,et al. The Cipher SHARK , 1996, FSE.
[563] David Paul Maher,et al. Crypto backup and key escrow , 1996, CACM.
[564] Stephen M. Matyas,et al. A proposed mode for triple-DES encryption , 1996, IBM J. Res. Dev..
[565] Lars R. Knudsen,et al. On the Difficulty of Software Key Escrow , 1996, EUROCRYPT.
[566] Lars R. Knudsen,et al. Truncated Differentials of SAFER , 1996, FSE.
[567] Tsutomu Matsumoto,et al. Optimization of Time-Memory Trade-Off Cryptanalysis and Its Application to DES, FEAL-32, and Skipjack (Special Section on Cryptography and Information Security) , 1996 .
[568] Willi Meier,et al. Improved Differential Attacks on RC5 , 1996, CRYPTO.
[569] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[570] Helen May Gustafson. Statistical analysis of symmetric ciphers , 1996 .
[571] Eli Biham,et al. Two Practical and Provably Secure Block Ciphers: BEARS and LION , 1996, FSE.
[572] Daniel Bleichenbacher,et al. Generating EIGamal Signatures Without Knowing the Secret Key , 1996, EUROCRYPT.
[573] Jacques Stern,et al. An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding , 1996, EUROCRYPT.
[574] Matthew K. Franklin,et al. Low-Exponent RSA with Related Messages , 1996, EUROCRYPT.
[575] Steve Dusse,et al. S/MIME Message Specification: PKCS Security Services for MIME , 1996 .
[576] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[577] C. Mitchell,et al. Redundant integer representations and fast exponentiation , 1996 .
[578] Hyunsoo Yoon,et al. New Modular Multiplication Algorithms for Fast Modular Exponentiation , 1996, EUROCRYPT.
[579] David M. Balenson,et al. Commercial key recovery , 1996, CACM.
[580] Dorothy E. Denning,et al. A taxonomy for key escrow encryption systems , 1996, CACM.
[581] Jörg Schwenk,et al. Public Key Encryption and Signature Schemes Based on Polynomials over Zn , 1996, EUROCRYPT.
[582] Stefan Lucks,et al. Faster Luby-Rackoff Ciphers , 1996, FSE.
[583] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[584] Ed Dawson,et al. A Comparison of Fast Correlation Attacks , 1996, FSE.
[585] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[586] Fred Piper. Introduction to cryptology , 1997, Inf. Secur. Tech. Rep..
[587] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[588] Mike Gardner. A new kind of cipher that would take millions of years to break , 1997 .
[589] Daniel J. Bernstein,et al. Detecting perfect powers in essentially linear time , 1998, Math. Comput..
[590] Ivan Damgård,et al. Zero-Knowledge Authentication Scheme with Secret Key Exchange , 1988, Journal of Cryptology.
[591] Phillip Rogaway,et al. A Software-Optimized Encryption Algorithm , 1998, Journal of Cryptology.
[592] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[593] G. Jain. Zero Knowledge Proofs : A Survey , .