Abstract is missing.
- Efficient Signature Schemes Based on Birational PermutationsAdi Shamir. 1-12 [doi]
- A New Identification Scheme Based on Syndrome DecodingJacques Stern. 13-21 [doi]
- The Shrinking GeneratorDon Coppersmith, Hugo Krawczyk, Yishay Mansour. 22-39 [doi]
- An Integrity Check Value Algorithm for Stream CiphersRichard Taylor. 40-48 [doi]
- Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract)Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng. 49-60 [doi]
- A Low Communication Competitive Interactive Proof System for Promised Quadratic ResiduosityToshiya Itoh, Masafumi Hoshi, Shigeo Tsujii. 61-72 [doi]
- Secret Sharing and Perfect Zero KnowledgeAlfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano. 73-84 [doi]
- On Message Proof Systems with Known Space VerifiersYonatan Aumann, Uriel Feige. 85-99 [doi]
- Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract)Ivan Damgård. 100-109 [doi]
- Fully Dynamic Secret Sharing SchemesCarlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro. 110-125 [doi]
- Multisecret Threshold SchemesWen-Ai Jackson, Keith M. Martin, Christine M. O Keefe. 126-135 [doi]
- Secret Sharing Made ShortHugo Krawczyk. 136-146 [doi]
- A Subexponential Algorithm for Discrete Logarithms over All Finite FieldsLeonard M. Adleman, Jonathan DeMarrais. 147-158 [doi]
- An Implementation of the General Number Field SieveJohannes Buchmann, J. Loho, J. Zayer. 159-165 [doi]
- On the Factorization of RSA-120Thomas F. Denny, Bruce Dodson, Arjen K. Lenstra, Mark S. Manasse. 166-174 [doi]
- Comparison of Three Modular Reduction FunctionsAntoon Bosselaers, René Govaerts, Joos Vandewalle. 175-186 [doi]
- Differtial Cryptanalysis of LuciferIshai Ben-Aroya, Eli Biham. 187-199 [doi]
- Differential Attack on Message Authentication CodesKazuo Ohta, Mitsuru Matsui. 200-211 [doi]
- Cryptanalysis of the CFB Mode of the DES with a Reduced Number of RoundsBart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens. 212-223 [doi]
- Weak Keys for IDEAJoan Daemen, René Govaerts, Joos Vandewalle. 224-231 [doi]
- Entity Authentication and Key DistributionMihir Bellare, Phillip Rogaway. 232-249 [doi]
- On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop SignaturesIvan Damgård, Torben P. Pedersen, Birgit Pfitzmann. 250-265 [doi]
- Joint Encryption and Message-Efficient Secure ComputationMatthew K. Franklin, Stuart Haber. 266-277 [doi]
- Cryptographic Primitives Based on Hard Learning ProblemsAvrim Blum, Merrick L. Furst, Michael J. Kearns, Richard J. Lipton. 278-291 [doi]
- Extensions of Single-term CoinsNiels Ferguson. 292-301 [doi]
- Untraceable Off-line Cash in Wallets with Observers (Extended Abstract)Stefan Brands. 302-318 [doi]
- Discreet Solitary GamesClaude Crépeau, Joe Kilian. 319-330 [doi]
- On Families of Hash Functions via Geometric Codes and ConcatenationJürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets. 331-342 [doi]
- On the Construction of Perfect Authentication Codes that Permit ArbitrationThomas Johansson. 343-354 [doi]
- Codes for Interactive AuthenticationPeter Gemmell, Moni Naor. 355-367 [doi]
- Hash Functions Based on Block Ciphers: A Synthetic ApproachBart Preneel, René Govaerts, Joos Vandewalle. 368-378 [doi]
- Security of Iterated Hash Functions Based on Block CiphersWalter Hohl, Xuejia Lai, Thomas Meier, Christian Waldvogel. 379-390 [doi]
- Improved Algorithms for the Permuted Kernel ProblemJacques Patarin, Pascal Chauvaud. 391-402 [doi]
- On the Distribution of Characteristics in Composite PermutationsLuke O Connor. 403-412 [doi]
- Remark on the Threshold RSA Signature SchemeChuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee. 413-420 [doi]
- Another Method for Attaining Security Against Adaptively Chosen Ciphertext AttacksChae Hoon Lim, Pil Joong Lee. 420-434 [doi]
- Attacks on the Birational Permutation Signature SchemesDon Coppersmith, Jacques Stern, Serge Vaudenay. 435-443 [doi]
- Interaction in Key Distribution Schemes (Extended Abstract)Amos Beimel, Benny Chor. 444-455 [doi]
- Secret-Key Agreement without Public-Key CryptographyFrank Thomson Leighton, Silvio Micali. 456-479 [doi]
- Broadcast EncryptionAmos Fiat, Moni Naor. 480-491 [doi]