What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from AUSCRYPT 1990
Year
Venue
Title
1990
AUSCRYPT
A (non-practical) three-pass identification protocol using coding theory
Marc Girault
1990
AUSCRYPT
A Binary Sequence Generator Based on Ziv-Lempel Source Coding
Cees J. A. Jansen
Dick E. Boekee
1990
AUSCRYPT
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence
Miodrag J. Mihaljevic
Jovan Dj. Golic
1990
AUSCRYPT
A Fast Modular-multiplication Module for Smart Cards
Hikaru Morita
1990
AUSCRYPT
A Note on Strong Fibonacci Pseudoprimes
Rudolf Lidl
Winfried B. Müller
1990
AUSCRYPT
Anonymous One-Time Signatures and Flexible Untraceable Electronic Cash
Barry Hayes
1990
AUSCRYPT
Comparison of Block Ciphers
Helen Gustafson
Ed Dawson
William J. Caelli
1990
AUSCRYPT
Continued Fractions and the Berlekamp-Massey Algorithm
Zong-Duo Dai
Kencheng Zeng
1990
AUSCRYPT
Demonstrating Possession without Revealing Factors and its Application
Hiroki Shizuya
Kenji Koyama
Toshiya Itoh
1990
AUSCRYPT
Direct Demonstration of the Power to Break Public-Key Cryptosystems
Kenji Koyama
1990
AUSCRYPT
Dyadic Matrices and Their Potential Significance in Cryptography
Yi Xian Yang
1990
AUSCRYPT
Formal Specification and Verification of Secure Communication Protocols
Svein J. Knapskog
1990
AUSCRYPT
K-M Sequence is Forwardly Predictable
Yi Xian Yang
1990
AUSCRYPT
Key Scheduling In Des Type Cryptosystems
Lawrence Brown
Jennifer Seberry
1990
AUSCRYPT
KEYMEX: An expert system for the design of key management schemes
Jan C. A. van der Lubbe
Dick E. Boekee
1990
AUSCRYPT
Large Primes in Stream Cipher Cryptography
Kencheng Zeng
Chung-Huang Yang
T. R. N. Rao
1990
AUSCRYPT
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
Lawrence Brown
Josef Pieprzyk
Jennifer Seberry
1990
AUSCRYPT
Lower Bounds on the Weight Complexities of Cascaded Binary Sequences
Cunsheng Ding
1990
AUSCRYPT
Meet-in-the-Middle Attack on Digital Signature Schemes
Kazuo Ohta
Kenji Koyama
1990
AUSCRYPT
Minòs: Extended User Authentication
Michael Newberry
1990
AUSCRYPT
Network Security Policy Models
Vijay Varadharajan
1990
AUSCRYPT
Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key
Guang Gong
1990
AUSCRYPT
On The Formal Analysis of PKCS Authentication Protocols
Klaus Gaarder
Einar Snekkenes
1990
AUSCRYPT
On the Significance of the Directed Acyclic Word Graph in Cryptology
Cees J. A. Jansen
Dick E. Boekee
1990
AUSCRYPT
Parallel Generation of Pseudo-Random Sequences
Reihaneh Safavi-Naini
1990
AUSCRYPT
Permutation Generators of Alternating Groups
Josef Pieprzyk
Xian-Mo Zhang
1990
AUSCRYPT
Range Equations and Range Matrices: a Study in Statistical Database Security
Vangalur S. Alagar
1990
AUSCRYPT
Record Encryption in Distributed Databases
Thomas Hardjono
1990
AUSCRYPT
RSA as a Benchmark for Multiprocessor Machines
Rodney H. Cooper
Wayne Patterson
1990
AUSCRYPT
Secure Cryptographic Initialisation
Mark Ames
1990
AUSCRYPT
Secure User Access Control for Public Networks
Pil Joong Lee
1990
AUSCRYPT
Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms
David Chaum
1990
AUSCRYPT
Solving Equations in Sequences
Kencheng Zeng
Minqiang Huang
1990
AUSCRYPT
Some Remarks on Authentication Systems
Martin Anthony
Keith M. Martin
Jennifer Seberry
Peter R. Wild
1990
AUSCRYPT
The Implementation of Elliptic Curve Cryptosystems
Alfred Menezes
Scott A. Vanstone
1990
AUSCRYPT
The Practical Application Of State Of The Art Security In Real Environments
Ronald Ferreira
1990
AUSCRYPT
The Three Faces of Information Security
John M. Carroll
1990
AUSCRYPT
Universal Logic Sequences
Ed Dawson
Bruce Goldburg
1990
AUSCRYPT
VLSI Design for Exponentiation in GF (2<sup>n</sup>)
Willi Geiselmann
Dieter Gollmann