Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jørgen Brandt, Ivan Damgård |
On Generation of Probable Primes By Incremental Search. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Douglas R. Stinson |
Combinatorial Characterizations of Authentication Codes. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Yeow Meng Chee, Antoine Joux, Jacques Stern |
The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Marie-Jeanne Toussaint |
Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract). |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Steven Rudich |
The Use of Interaction in Public Cryptosystems (Extended Abstract). |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Dwork |
On Verification in Secret Sharing. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth R. Iversen |
A Cryptographic Scheme for Computerized Elections. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto, Kouichi Sakurai |
Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Albert G. Broscius, Jonathan M. Smith |
Exploiting Parallelism in Hardware Implementations of the DES. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Donald Beaver |
Efficient Multiparty Protocols Using Circuit Randomization. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Patarin |
New Results on Pseudorandom Permutation Generators Based on the DES Scheme. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Bert den Boer, Antoon Bosselaers |
An Attack on the Last Two Rounds of MD4. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Charles Rackoff, Daniel R. Simon |
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Donald Beaver |
Foundations of Secure Interactive Computing. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin |
A Calculus for Access Control in Distributed Systems. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Yair Frankel |
Shared Generation of Authenticators and Signatures (Extended Abstract). |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Fischer, Rebecca N. Wright |
Multiparty Secret Key Exchange Using a Random Deal of Cards. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Kenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone |
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto, Kazuo Ohta |
Universal Electronic Cash. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Charles H. Bennett, Gilles Brassard, Claude Crépeau, Marie-Hélène Skubiszewska |
Practical Quantum Oblivious Transfer. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Shigeo Tsujii, Jinhui Chao |
A New ID-Based Key Sharing System. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Colin D. Walter |
Faster Modular Multiplication by Operand Scaling. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
Fast Computer Arithmetic, Digital Arithmetic Methods, RSA Algorithm, Cryptography, Modular Multiplication |
1 | Neal Koblitz |
CM-Curves with Good Cryptographic Properties. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Douglas R. Stinson |
Universal Hashing and Authentication Codes. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro |
On the Size of Shares for Secret Sharing Schemes. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Eli Biham, Adi Shamir |
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung |
Systematic Design of Two-Party Authentication Protocols. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård |
Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Birgit Pfitzmann, Michael Waidner |
How To Break and Repair A "Provably Secure" Untraceable Payment System. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Dror Lapidot, Adi Shamir |
A One-Round, Two-Prover, Zero-Knowledge Protocol for NP. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Alfred Menezes, Scott A. Vanstone (eds.) |
Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Shang-Hua Teng |
Functional Inversion and Communication Complexity. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Micali, Phillip Rogaway |
Secure Computation (Abstract). |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Paul Camion, Claude Carlet, Pascale Charpin, Nicolas Sendrier |
On Correlation-Immune Functions. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Joe Kilian, Ronitt Rubinfeld |
Interactive Proofs with Space Bounded Provers. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi |
A Switching Closure Test to Analyze Cryptosystems. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Michael Luby |
Pseudo-random Generators from One-way Functions (Abstract). |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | David Chaum, Eugène van Heijst, Birgit Pfitzmann |
Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Anne Tardy-Corfdir, Henri Gilbert |
A Known Plaintext Attack of FEAL-4 and FEAL-6. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Torben P. Pedersen |
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Eli Biham, Adi Shamir |
Differential Cryptanalysis of DES-like Cryptosystems. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Moti Yung |
Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract). |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer |
A Universal Statistical Test for Random Bit Generators. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Dominique de Waleffe, Jean-Jacques Quisquater |
CORSAIR: A SMART Card for Public Key Cryptosystems. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
public key algorithms, digital signature, Smart card, RSA, zero-knowledge protocols |
1 | Joan Boyar, David Chaum, Ivan Damgård, Torben P. Pedersen |
Convertible Undeniable Signatures. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ronald L. Rivest |
Finding Four Million Large Random Primes. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Shoji Miyaguchi |
The FEAL Cipher Family. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Brassard, Claude Crépeau |
Quantum Bit Commitment and Coin Tossing Protocols. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Alfredo De Santis, Moti Yung |
Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Yacov Yacobi |
Discrete-Log With Compressible Exponents. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Brassard, Moti Yung |
One-Way Group Actions. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kenji Koyama, Routo Terada |
Nonlinear Parity Circuits and their Cryptographic Applications. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Brian A. LaMacchia, Andrew M. Odlyzko |
Solving Large Sparse Linear Systems over Finite Fields. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ralph C. Merkle |
Fast Software Encryption Functions. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Micali, Tal Rabin |
Collective Coin Tossing Without Assumptions nor Broadcasting. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kwangjo Kim, Tsutomu Matsumoto, Hideki Imai |
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Othmar Staffelbach, Willi Meier |
Cryptographic Significance of the Carry for Ciphers Based on Integer Addition. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Thomas W. Cusick, Michael C. Wood |
The REDOC II Cryptosystem. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Beth, Yvo Desmedt |
Identification Tokens - or: Solving the Chess Grandmaster Problem. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Joe Kilian |
Achieving Zero-Knowledge Robustly. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Donald Beaver, Joan Feigenbaum, Victor Shoup |
Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract). |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Henri Gilbert, Guy Chassé |
A Statistical Attack of the FEAL-8 Cryptosystem. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Brian A. LaMacchia, Andrew M. Odlyzko |
Computation of Discrete Logarithms in Prime Fields (Extended Abstract). |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | A. W. Schrift, Adi Shamir |
On the Universality of the Next Bit Test. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Stuart Haber, W. Scott Stornetta |
How to Time-Stamp a Digital Document. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ronald L. Rivest |
The MD4 Message Digest Algorithm. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ernest F. Brickell, Douglas R. Stinson |
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Johannes A. Buchmann, Stephan Düllmann |
On the Computation of Discrete Logarithms in Class Groups. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Shafi Goldwasser (eds.) |
Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Yacov Yacobi |
A Key Distribution "Paradox". |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | David Chaum, Sandra Roijakkers |
Unconditionally Secure Digital Signatures. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai |
Structural Properties of One-way Hash Functions. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao |
An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Shafi Goldwasser, Leonid A. Levin |
Fair Computation of General Functions in Presence of Immoral Majority. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Shigeo Tsujii |
Multi-Language Zero Knowledge Interactive Proof Systems. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Joe Kilian |
Interactive Proofs with Provable Security Against Honest Verifiers. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Paul C. van Oorschot |
A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Chwen Chuang, James George Dunham |
Matrix Extensions of the RSA Algorithm. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Donald Beaver, Joan Feigenbaum, Joe Kilian, Phillip Rogaway |
Security with Low Communication Overhead. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Dror Lapidot, Adi Shamir |
Publicly Verifiable Non-Interactive Zero-Knowledge Proofs. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Neal Koblitz |
Constructing Elliptic Curve Cryptosystems in Characteristic 2. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kireeti Kompella, Leonard M. Adleman |
Fast Checkers for Cryptography. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | James L. McInnes, Benny Pinkas |
On the Impossibility of Private Key Cryptography with Weakly Random Keys. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Shimon Even |
Systolic Modular Multiplication. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Richard Cleve |
Complexity Theoretic Issues Concerning Block Ciphers Related to D.E.S. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto, Kazuo Ohta |
How to Utilize the Randomness of Zero-Knowledge Proofs. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Brassard (eds.) |
Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Walter Fumy, Michael Munzert |
A Modular Approach to Key Distribution. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Gustavus J. Simmons |
Geometric Shared Secret and/or Shared Control Schemes. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ernest F. Brickell |
A Survey of Hardware Implementation of RSA (Abstract). |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Uriel Feige, Adi Shamir |
Zero Knowledge Proofs of Knowledge in Two Rounds. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Donald Beaver |
Multiparty Protocols Tolerating Half Faulty Processors. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer, James L. Massey |
Perfect Local Randomness in Pseudo-Random Sequences. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle |
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | David Kahn |
Keying the German Navy's Enigma. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Krawczyk |
How to Predict Congruential Generators. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | John T. Kohl |
The use of Encryption in Kerberos for Network Authentication. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Carlisle M. Adams, Stafford E. Tavares |
Good S-Boxes Are Easy To Find. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Joan Boyar, René Peralta 0001 |
On the Concrete Complexity of Zero-Knowledge Proofs. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Gerald C. Chick, Stafford E. Tavares |
Flexible Access Control with Master Keys. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|