What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1996
Year
Venue
Title
1996
CRYPTO
(title unknown)
★
Invited talk
Clifford Stoll
1996
CRYPTO
Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings
1996
CRYPTO
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract)
Dan Boneh
Richard J. Lipton
1996
CRYPTO
All Bits ax+b mod p are Hard (Extended Abstract)
Mats Näslund
1996
CRYPTO
Anonymous Communication and Anonymous Cash
Daniel R. Simon
1996
CRYPTO
Asymmetric Cryptography with a Hidden Monomial
Jacques Patarin
1996
CRYPTO
Cryptographic applications in electronic commerce
★
Invited talk
Ernest F. Brickell
1996
CRYPTO
Cryptology, Technology, and Politics
★
Invited talk
Whitfield Diffie
1996
CRYPTO
Diffie-Hellman Oracles
Ueli Maurer
Stefan Wolf
1996
CRYPTO
Export Controls: Past, Present, and Future
★
Invited talk
Andrew Clark
1996
CRYPTO
Fast Hashing on the Pentium
Antoon Bosselaers
René Govaerts
Joos Vandewalle
1996
CRYPTO
Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations
Paul Camion
Anne Canteaut
1996
CRYPTO
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
Dan Boneh
Ramarathnam Venkatesan
1996
CRYPTO
Hidden Collisions on DSS
Serge Vaudenay
1996
CRYPTO
How to Protect DES Against Exhaustive Key Search
Joe Kilian
Phillip Rogaway
1996
CRYPTO
Improved Differential Attacks on RC5
Lars R. Knudsen
Willi Meier
1996
CRYPTO
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude
Paul C. van Oorschot
Michael J. Wiener
1996
CRYPTO
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
John Kelsey
Bruce Schneier
David Wagner
1996
CRYPTO
Keying Hash Functions for Message Authentication
Mihir Bellare
Ran Canetti
Hugo Krawczyk
1996
CRYPTO
Linear Complexity of Periodic Sequences: A General Theory
James L. Massey
Shirlei Serconek
1996
CRYPTO
New Generation of Secure and Practical RSA-Based Signatures
Ronald Cramer
Ivan Damgård
1996
CRYPTO
New Results on Visual Cryptography
Stefan Droste
1996
CRYPTO
On Fast and Provably Secure Message Authentication Based on Universal Hashing
Victor Shoup
1996
CRYPTO
Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing
Shai Halevi
Silvio Micali
1996
CRYPTO
Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers
Markus Jakobsson
Moti Yung
1996
CRYPTO
Quantum Cryptography over Underground Optical Fibers
R. J. Hughes
G. G. Luther
G. L. Morgan
C. G. Peterson
C. M. Simmons
1996
CRYPTO
Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
Dominic Mayers
1996
CRYPTO
Relation of Theory to Practice in Cryptography
★
Invited talk
Ronald L. Rivest
1996
CRYPTO
Robust and Efficient Sharing of RSA Functions
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1996
CRYPTO
Security of $2^t$-Root Identification and Signatures
Claus-Peter Schnorr
1996
CRYPTO
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?
Adam Young
Moti Yung
1996
CRYPTO
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
Paul C. Kocher
1996
CRYPTO
Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
Carlo Blundo
Luiz A. Frota Mattos
Douglas R. Stinson
1996
CRYPTO
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings
Tor Helleseth
Thomas Johansson
1996
CRYPTO
Universal Hashing and Multiple Authentication
Mustafa Atici
Douglas R. Stinson
1996
CRYPTO
Weakness in Some Threshold Cryptosystems
Susan K. Langford