CRYPTO A*

37 papers

YearTitle / Authors
1987Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings
Andrew M. Odlyzko
1986A High Speed Manipulation Detection Code.
Robert R. Jueneman
1986A Modification of a Broken Public-Key Cipher.
John J. Cade
1986A Pseudo-Random Bit Generator Based on Elliptic Logarithms.
Burton S. Kaliski Jr.
1986A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations.
David Chaum, Jan-Hendrik Evertse
1986A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face.
Claude Crépeau
1986All-or-Nothing Disclosure of Secrets.
Gilles Brassard, Claude Crépeau, Jean-Marc Robert
1986Architectures for Exponentiation in GF(2
Thomas Beth, B. M. Cook, Dieter Gollmann
1986Breaking the Cade Cipher.
N. S. James, Rudolf Lidl, Harald Niederreiter
1986Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols.
Josh Cohen Benaloh
1986Cycle Structures of the DES with Weak and Semi-Weak Keys.
Judy H. Moore, Gustavus J. Simmons
1986Demonstrating Possession of a Discrete Logarithm Without Revealing It.
David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf, René Peralta
1986Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How.
David Chaum
1986Electronic Funds Transfer Point of Sale in Australia.
Ralph Gyoery, Jennifer Seberry
1986How to Prove Yourself: Practical Solutions to Identification and Signature Problems.
Amos Fiat, Adi Shamir
1986How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design.
Oded Goldreich, Silvio Micali, Avi Wigderson
1986How to Share a Secret with Cheaters.
Martin Tompa, Heather Woll
1986Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor.
Paul Barrett
1986Is There an ultimate Use of Cryptography?
Yvo Desmedt
1986Large-Scale Randomization Techniques.
Neal R. Wagner, Paul Putter, Marianne R. Cain
1986On the Linear Span of binary Sequences Obtained from Finite Geometries.
Agnes Hui Chan, Richard A. Games
1986Private-Key Algebraic-Coded Cryptosystems.
T. R. N. Rao, Kil-Hyun Nam
1986Public-Key Registration.
Stephen M. Matyas
1986Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?).
Yvo Desmedt, Jean-Jacques Quisquater
1986Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing.
Josh Cohen Benaloh
1986Smallest Possible Message Expansion in Threshold Schemes.
G. R. Blakley, R. D. Dixon
1986Smart Card, a Highly Reliable and Portable Security Device.
Louis C. Guillou, Michel Ugon
1986Some Constructions and Bounds for authentication Codes.
Douglas R. Stinson
1986Some Variations on RSA Signatures and Their Security.
Wiebren de Jonge, David Chaum
1986Structure in the S-boxes of the DES.
Ernest F. Brickell, Judy H. Moore, M. R. Purtill
1986THOMAS - A Complete Single Chip RSA Device.
Gordon Rankine
1986The Notion of Security for Probabilistic Cryptosystems.
Silvio Micali, Charles Rackoff, Bob Sloan
1986Towards a Theory of Software Protection.
Oded Goldreich
1986Two Observations on Probabilistic Primality Testing.
Pierre Beauchemin, Gilles Brassard, Claude Crépeau
1986Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme.
Oded Goldreich
1986VLSI Implementation of Public-Key Encryption Algorithms.
Glenn A. Orton, M. P. Roy, P. Andrew Scott, Lloyd E. Peppard, Stafford E. Tavares
1986Zero-Knowledge Simulation of Boolean Circuits.
Gilles Brassard, Claude Crépeau