{"entities":{"Q1899994":{"pageid":1910736,"ns":120,"title":"Item:Q1899994","lastrevid":43406934,"modified":"2025-07-25T13:14:35Z","type":"item","id":"Q1899994","labels":{"en":{"language":"en","value":"Advances in cryptology - EUROCRYPT '94. Workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 805923"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1899994$4C350DCD-B9B9-4DAE-852F-723CD5B27523","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"946a63a38331441a1ef4cb03e632b6ec297dce03","datavalue":{"value":{"text":"Advances in cryptology - EUROCRYPT '94. Workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1899994$A63B2C7F-E4FC-49FA-9383-7B5F63051413","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"5e1b1a7b48faa8c4a2e7e4e8475f062e6b2a6d26","datavalue":{"value":"0847.00061","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1899994$6D7262A5-6092-4376-9D03-551C57713C8C","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1899994$953FB1AE-9D92-457E-9D5B-2F53FD813DE2","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"5b68e4da85feecb65bde1c982d147892bbd6cdd4","datavalue":{"value":{"time":"+1995-10-16T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1899994$1D2A47B4-0EDF-4483-AB97-BCFEF7CF7232","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"9bb510135b6d5e6367e4c8d9a76194fdb1246877","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference (1992) has been reviewed (see Zbl 0782.00086).  Indexed articles:  \\textit{Naor, Moni; Shamir, Adi}, Visual cryptography, 1-12 [Zbl 0878.94048]  \\textit{Csirmaz, L\u00e1szl\u00f3}, The size of share must be large, 13-22 [Zbl 0885.94020]  \\textit{van Dijk, Marten}, A linear construction of perfect secret sharing schemes, 23-34 [Zbl 0909.94010]  \\textit{Blundo, C.; Gaggia, A. Giorgio; Stinson, D. R.}, On the dealer's randomness required in secret sharing schemes, 35-46 [Zbl 0885.94018]  \\textit{Schnorr, C. P.; Vaudenav, S.}, Black box cryptanalysis of hash networks based on multipermutations, 47-57 [Zbl 0909.94013]  \\textit{Joux, Antoine; Granboulan, Louis}, A practical attack against knapsack based hash functions. (Extended abstract), 58-66 [Zbl 0909.94012]  \\textit{Franklin, Matthew; Yung, Moti}, The blinding of weak signatures. (Extended abstract), 67-76 [Zbl 0881.94014]  \\textit{Naccache, David; M'Ra\u00efhi, David; Vaudenay, Serge; Ra\u1e57haeli, Dan}, Can D.S.A. be improved? Complexity trade-offs with the digital signature standard, 77-85 [Zbl 0881.94016]  \\textit{Chaum, David}, Designated confirmer signatures, 86-91 [Zbl 0881.94013]  \\textit{Bellare, Mihir; Rogaway, Phillip}, Optimal asymmetric encryption, 92-111 [Zbl 0881.94010]  \\textit{Orton, Glenn}, A multiple-iterated trapdoor for dense compact knapsacks., 112-130 [Zbl 1126.94334]  \\textit{Chabaud, Florent}, On the security of some cryptosystems based on error-correcting codes, 131-139 [Zbl 0881.94018]  \\textit{Chen, L.; Damg\u00e5rd, I. B.; Pedersen, T. P.}, Parallel divertibility of proofs of knowledge. (Extended abstract), 140-155 [Zbl 0881.94017]  \\textit{D'Amiano, Stefano; Di Crescenzo, Giovanni}, Methodology for digital money based on general cryptographic tools, 156-170 [Zbl 0879.94034]  \\textit{Chen, L.; Pedersen, T. P.}, New group signature schemes. (Extended abstract), 171-181 [Zbl 0879.94027]  \\textit{Nyberg, Kaisa; Rueppel, Rainer A.}, Message recovery for signature schemes based on the discrete logarithm problem, 182-193 [Zbl 0879.94028]  \\textit{Li, Chuan-Ming; Hwang, Tzonelih; Lee, Narn-Yih}, Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders, 194-204 [Zbl 0881.94015]  \\textit{Meier, Willi; Staffelbach, Othmar}, The self-shrinking generator, 205-214 [Zbl 0881.94009]  \\textit{Goresky, Mark; Klapper, Andrew}, Feedback registers based on ramified extensions of the 2-adic numbers. (Extended abstract), 215-222 [Zbl 0879.94019]  \\textit{G\u00f6ttfert, Rainer; Niederreiter, Harald}, A general lower bound for the linear complexity of the product of shift-register sequences, 223-229 [Zbl 0881.94008]  \\textit{Goli\u0107, Jovan Dj.; O'Connor, Luke}, Embedding and probabilistic correlation attacks on clock-controlled shift registers, 230-243 [Zbl 0879.94020]  \\textit{Taylor, Richard}, Near optimal unconditionally secure authentication, 244-253 [Zbl 0879.94029]  \\textit{Safavi-Naini, R.; Tombak, L.}, Authentication codes in plaintext and chosen-content attacks, 254-265 [Zbl 0885.94026]  \\textit{Cachin, Christian; Maurer, Ueli M.}, Linking information reconciliation and privacy amplification. (Extended abstract), 266-274 [Zbl 0879.94022]  \\textit{Burmester, Mike; Desmedt, Yvo}, A secure and efficient conference key distribution system. (Extended abstract), 275-286 [Zbl 0879.94021]  \\textit{Blundo, Carlo; Cresti, Antonella}, Space requirements for broadcast encryption, 287-298 [Zbl 0879.94030]  \\textit{Zheng, Yuliang}, How to break and repair Leighton and Micali's key agreement protocol, 299-305 [Zbl 0879.94032]  \\textit{Eng, Tony; Okamoto, Tatsuaki}, Single-term divisible electronic coins, 306-319 [Zbl 0879.94035]  \\textit{Syverson, Paul; Meadows, Catherine}, Formal requirements for key distribution protocols., 320-331 [Zbl 1126.94342]  \\textit{Pfitzmann, Birgit}, Breaking an efficient anonymous channel, 332-340 [Zbl 0879.94031]  \\textit{Biham, Eli}, On Matsui's linear cryptoanalysis, 341-355 [Zbl 0879.94025]  \\textit{Chabaud, Florent; Vaudenay, Serge}, Links between differential and linear cryptanalysis, 356-365 [Zbl 0879.94023]  \\textit{Matsui, Mitsuru}, On correlation between the order of S-boxes and the strength of DES, 366-375 [Zbl 0879.94024]  \\textit{Seberry, Jennifer; Zhang, Xiao-Mo; Zhang, Yuliang}, Relationship among nonlinearity criteria. (Extended abstract), 376-388 [Zbl 0909.94014]  \\textit{de Rooij, Peter}, Efficient exponentiation using precomputation and vector addition chains, 389-399 [Zbl 0879.94026]  \\textit{Damm, F.; Heider, F.-P.; Wambach, G.}, MIMD-factorisation on hypercubes, 400-409 [Zbl 0957.11053]  \\textit{Knudsen, Lars R.; Lai, Xuejia}, New attacks on all double block length hash functions of hash rate 1, including the Parallel-DM, 410-418 [Zbl 0885.94021]  \\textit{Knudsen, Lars Ramkilde}, New potentially `weak' keys for DES and LOKI. (Extended abstract), 419-424 [Zbl 0925.94090]  \\textit{Jakobsson, Markus}, Blackmailing using undeniable signatures, 425-427 [Zbl 0909.94011]  \\textit{Camenisch, Jan L.; Piveteau, Jean-Marc; Stadler, Markus A.}, Blind signatures based on the discrete logarithm problem, 428-432 [Zbl 0885.94019]  \\textit{Charnes, C.; O'Connor, L.; Pieprzyk, J.; Safavi-Naini, R.; Zheng, Y.}, Comments on Soviet encryption algorithm, 433-438 [Zbl 0879.94033]  \\textit{Nyberg, Kaisa}, Linear approximation of block ciphers, 439-444 [Zbl 0885.94023]  \\textit{Shamir, Adi}, Memory efficient variants of public-key schemes for smart card applications, 445-449 [Zbl 0885.94027]  \\textit{Menicocci, Renato}, A systematic attack on clock controlled cascades, 450-455 [Zbl 0885.94022]  \\textit{Johansson, Thomas; Smeets, Ben}, On \\(A^ 2\\)-codes including arbiter's attacks, 456-460 [Zbl 0888.94014]  \\textit{Biham, Eli; Biryukov, Alex}, An improvement of Davies' attack on DES, 461-467 [Zbl 0881.94011]  \\textit{Hruby, J.}, \\(q\\)-deformed quantum cryptography, 468-472 [Zbl 0881.94019]","type":"string"},"datatype":"string"},"type":"statement","id":"Q1899994$4CCE5DF5-6A74-415C-B7EF-6D6785A816CC","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1899994$EA120CF5-C132-42F9-8571-6C14E2B0CC37","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1899994$7364941A-248B-4B7D-BBF6-4433B9046BF3","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1899994$483AA47B-734F-4852-8A39-E17CF1230194","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1899994$66001CD6-CDE4-4163-BBD6-96F4EEBE1C07","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"187a79359c409e528113062ce826a81b92c6e2c2","datavalue":{"value":"805923","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1899994$267BAEA2-FB91-48F0-A251-7625DE27D3A8","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9444c7e81fc487ab48d60d555be7e74462154789","datavalue":{"value":"Cryptology","type":"string"},"datatype":"string"},"type":"statement","id":"Q1899994$9C7E8E92-9911-4595-9F73-7AABD11D6915","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"a6e8e0af2097b020352cbdb6562811de0b9961fb","datavalue":{"value":"EUROCRYPT","type":"string"},"datatype":"string"},"type":"statement","id":"Q1899994$E2BCB05B-6B31-43C3-99A0-E175BF244943","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"561016807f4a34e703288f83863c0075e924e39f","datavalue":{"value":"Cryptographic techniques","type":"string"},"datatype":"string"},"type":"statement","id":"Q1899994$522CA695-97AF-42AD-94E3-58EE028D7724","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"e7f0bcd2f3a8fc325d78140db7749c69f98c56b7","datavalue":{"value":"Perugia (Italy)","type":"string"},"datatype":"string"},"type":"statement","id":"Q1899994$9F19DCFF-F610-4A4C-BC1F-2694FBD1109A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q1899994$1BBC1F3C-BF7B-430B-90D9-FBA50F8AC612","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"f7c2172f0a2ed6197400daa3f44dae0d79725b1a","datavalue":{"value":"Workshop","type":"string"},"datatype":"string"},"type":"statement","id":"Q1899994$8869F19E-EA42-4F16-B0AC-1B53D90DD71C","rank":"normal"}],"P12":[{"mainsnak":{"snaktype":"value","property":"P12","hash":"747f71c6b38973af562c1303724c13827bbf4b30","datavalue":{"value":"Q21843218","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1899994$B85387CC-E2C3-4E1A-A6BC-48B155007738","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1899994$A4854B52-5824-4E39-92DE-43B5D39AA3D1","rank":"normal"}],"P1635":[{"mainsnak":{"snaktype":"value","property":"P1635","hash":"095326d02636451b4d6aad8df0393523ae1c30cb","datavalue":{"value":"conf/eurocrypt/94","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1899994$8A12487D-010F-477A-8C23-C5CBD112268F","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"697ffd35b556f53d8bf7ce8f0a6d2a4962c5bcc0","datavalue":{"value":"10.1007/BFB0053418","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1899994$9DE4DE10-20EE-4076-A185-83EA9084748C","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:1899994","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:1899994"}}}}}