Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | David Chaum, Hans Van Antwerpen |
Undeniable Signatures. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Jacques Quisquater, Jean-Paul Delescaille |
How Easy is Collision Search. New Results and Applications to DES. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto, Kazuo Ohta |
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård |
A Design Principle for Hash Functions. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Richard Cleve |
Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård |
On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Makoto Tatebayashi, Natsume Matsuzaki, David B. Newman Jr. |
Key Distribution Protocol for Digital Mobile Communication Systems. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Bender, Guy Castagnoli |
On the Implementation of Elliptic Curve Cryptosystems. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Jurjen N. Bos, Matthijs J. Coster |
Addition Chain Heuristics. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai |
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Silvio Micali |
Non-Interactive Oblivious Transfer and Spplications. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson |
How to Explain Zero-Knowledge Protocols to Your Children. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Adi Shamir |
An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract). |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Spyros S. Magliveras, Nasir D. Memon |
Properties of Cryptosystem PGM. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Shimon Even, Oded Goldreich 0001, Silvio Micali |
On-Line/Off-Line Digital Schemes. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Paul Barrett, Raymund Eisele |
The Smart Siskette - A Universal User Token and Personal Crypto-Engine. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Agnes Hui Chan, Richard A. Games |
On the Quadratic Spans of Periodic Sequences. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Moni Naor |
Bit Commitment Using Pseudo-Randomness. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Michael Ben-Or, Shafi Goldwasser, Joe Kilian, Avi Wigderson |
Efficient Identification Schemes Using Two Prover Interactive Proofs. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | David Chaum |
The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Hikaru Morita |
A Fast Modular-multiplication Algorithm based on a Higher Radix. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Cees J. A. Jansen, Dick E. Boekee |
The Shortest Feedback Shift Register That Can Generate A Given Sequence. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Shafi Goldwasser |
New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Shoji Miyaguchi |
The FEAL-8 Cryptosystem and a Call for Attack. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Joe Kilian, Silvio Micali, Rafail Ostrovsky |
Minimum Resource Zero-Knowledge Proofs (Extended Abstract). |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt |
Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Yacov Yacobi, Zahava Shmuely |
On Key Distribution Systems. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Buchmann 0001, Hugh C. Williams |
A Key Exchange System Based on Real Quadratic Fields. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Paul A. Findlay, Brian A. Johnson |
Modular Exponentiation Using Recursive Sums of Residues. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Steve R. White |
Covert Distributed Processing with Computer Viruses. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ralph C. Merkle |
A Certified Digital Signature. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
Receipts, Electronic Funds Transfer, CR categories: 3.56, 3.57, 4.9, Authentication, Cryptography, Digital Signatures, Public Key Cryptosystem, Electronic Signatures |
1 | Mihir Bellare, Lenore Cowen, Shafi Goldwasser |
On the Structure of Secret Key Exchange Protocols. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao |
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Donald Beaver, Shafi Goldwasser |
Multiparty Computation with Faulty Majority. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Marijke De Soete, Jean-Jacques Quisquater, Klaus Vedder |
A Signature with Shared Verification Scheme. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Rafail Ostrovsky |
An Efficient Software Protection Scheme. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ernest F. Brickell, Daniel M. Davenport |
On the Classification of Idea Secret Sharing Schemes. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | David C. Feldmeier, Philip R. Karn |
UNIX Password Security - Ten Years Later. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ruth Nelson, John H. Heimann |
SDNS Architecture and End-to-End Encryption. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Amos Fiat |
Batch RSA. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Yair Frankel |
Threshold Cryptosystems. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Oded Goldreich 0001, Hugo Krawczyk |
Sparse Pseudorandom Distributions. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan M. Smith |
Practical Problems with a Cryptographic Protection Scheme. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Claus-Peter Schnorr |
Efficient Identification and Signatures for Smart Cards. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Wyn L. Price |
Progress in Data Security Standardization. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Russell L. Brand |
Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang |
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Benny Chor, Eyal Kushilevitz |
Secret Sharing Over Infinite Domains (Extended Abstract). |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ralph C. Merkle |
One Way Hash Functions and DES. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Johan van Tilburg |
On the McEliece Public-Key Cryptosystem. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Stuart A. Kurtz, Stephen R. Mahaney, James S. Royer |
On the Power of 1-way Functions (Abstract). |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | J. R. Sherwood, V. A. Gallo |
The Application of Smart Cards for RSA Digital Signatures in a Network Comprising both Interactive and Store-and-Foreward Facilities. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård |
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Oded Goldreich 0001, Hugo Krawczyk, Michael Luby |
On the Existence of Pseudorandom Generators. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Tzonelih Hwang, T. R. N. Rao |
Secret Error-Correcting Codes (SECC). |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity |
1 | Michael Ben-Or, Oded Goldreich 0001, Shafi Goldwasser, Johan Håstad, Joe Kilian, Silvio Micali, Phillip Rogaway |
Everything Provable is Provable in Zero-Knowledge. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Josh Cohen Benaloh, Jerry Leichter |
Generalized Secret Sharing and Monotone Functions. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Blum 0001, Paul Feldman, Silvio Micali |
Proving Security Against Chosen Cyphertext Attacks. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Bert den Boer |
Diffie-Hellman is as Strong as Discrete Log for Certain Primes. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård |
On the Randomness of Legendre and Jacobi Sequences. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Kencheng Zeng, Minqiang Huang |
On the Linear Syndrome Method in Cryptanalysis. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Charles Rackoff |
A Basic Theory of Public and Private Cryptosystems. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Marc Girault, Philippe Toffin, Brigitte Vallée |
Computation of Approximate L-th Roots Modulo n and Application to Cryptography. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | David G. Steer, Leo Strawczynski, Whitfield Diffie, Michael J. Wiener |
A Secure Audio Teleconference System. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Tsutomu Matsumoto, Koki Kato, Hideki Imai |
Speeding Up Secret Computations with Insecure Auxiliary Devices. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Louis C. Guillou, Jean-Jacques Quisquater |
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology |
1 | Silvio Micali, Adi Shamir |
An Improvement of the Fiat-Shamir Identification and Signature Scheme. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Leonard M. Adleman |
An Abstract Theory of Computer Viruses. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Neal Koblitz |
A Family of Jacobians Suitable for Discrete Log Cryptosystems. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Kazuo Ohta, Tatsuaki Okamoto |
A Modification of the Fiat-Shamir Scheme. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Gustavus J. Simmons |
How to (Really) Share a Secret. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Ming-Deh A. Huang, Shang-Hua Teng |
A Universal Problem in Secure and Verifiable Distributed Computation. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Uriel Feige, Adi Shamir, Moshe Tennenholtz |
The Noisy Oracle Problem. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Claude Crépeau, Joe Kilian |
Weakening Security Assumptions and Oblivious Transfer (Abstract). |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Réjane Forré |
The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Marijke De Soete |
Bounds and Constructions for Authentication-Secrecy Codes with Splitting. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Ernest F. Brickell, Douglas R. Stinson |
The Detection of Cheaters in Threshold Schemes. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Carl Pomerance (eds.) |
Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Dwork, Larry J. Stockmeyer |
Zero-Knowledge With Finite State Verifiers. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Oded Goldreich 0001, Eyal Kushilevitz |
A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt |
Abuses in Cryptography and How to Fight Them. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Alfredo De Santis, Silvio Micali, Giuseppe Persiano |
Non-Interactive Zero-Knowledge with Preprocessing. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen |
Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract). |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | B. J. Herbison |
Developing Ethernet Enhanced-Security System. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Micali, Claus-Peter Schnorr |
Efficient, Perfect Random Number Generators. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Richard T. C. Kwok, Maurice Beale |
Aperiodic Linear Complexities of de Bruijn Sequences. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Russell Impagliazzo, Steven Rudich |
Limits on the Provable Consequences of One-way Permutations. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Eric Bach 0001 |
Intractable Problems in Number Theory. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | David Chaum, Amos Fiat, Moni Naor |
Untraceable Electronic Cash. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Martín Abadi, Eric Allender, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra |
On Generating Solved Instances of Computational Problems. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Michael Lucks |
A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Silvio Micali |
How To Sign Given Any Trapdoor Function. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Brassard, Ivan Damgård |
"Practical IP" <= MA. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Claude Goutier, Samy Bengio |
Special Uses and Abuses of the Fiat-Shamir Passport Protocol. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
1 | Gustavus J. Simmons |
A Natural Taxonomy for Digital Information Authentication Schemes. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
1 | Carlisle M. Adams, Henk Meijer |
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
public key cryptosystems, goppa codes |
1 | Michael Luby, Charles Rackoff |
A Study of Password Security. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
1 | Richard A. Kemmerer |
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
1 | Gustavus J. Simmons |
An Impersonation-Proof Identity Verfication Scheme. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
1 | Douglas R. Stinson |
A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|