CRYPTO A*

44 papers

YearTitle / Authors
1988Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings
Carl Pomerance
1987A Combinatorial Approach to Threshold Schemes.
Douglas R. Stinson, Scott A. Vanstone
1987A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs.
Douglas R. Stinson
1987A Crypto-Engine.
George I. Davida, Frank B. Dancs
1987A Digital Signature Based on a Conventional Encryption Function.
Ralph C. Merkle
1987A Generalization of Hellman's Extension of Shannon's Approach to Cryptography (Abstract).
Pierre Beauchemin, Gilles Brassard
1987A Natural Taxonomy for Digital Information Authentication Schemes.
Gustavus J. Simmons
1987A Realization Scheme for the Identity-Based Cryptosystem.
Hatsukazu Tanaka
1987A Simple and Secure Way to Show the Validity of Your Public Key.
Jeroen van de Graaf, René Peralta
1987A Study of Password Security.
Michael Luby, Charles Rackoff
1987A Video Scrambling Technique Based On Space Filling Curves.
Yossi Matias, Adi Shamir
1987An Impersonation-Proof Identity Verfication Scheme.
Gustavus J. Simmons
1987Analyzing Encryption Protocols Using Formal Verification Authentication Schemes.
Richard A. Kemmerer
1987Arbitration in Tamper Proof Systems.
George I. Davida, Brian J. Matt
1987Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme.
Yacov Yacobi
1987Components and Cycles of a Random Function.
John M. DeLaurentis
1987Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model.
Zvi Galil, Stuart Haber, Moti Yung
1987Cryptosystems Based on an Analog of Heat Flow.
G. R. Blakley, William Rundell
1987Direct Minimum-Knowledge Computations.
Russell Impagliazzo, Moti Yung
1987Efficient Digital Public-Key Signature with Shadow (Abstract).
Louis C. Guillou, Jean-Jacques Quisquater
1987Equivalence Between Two Flavours of Oblivious Transfers.
Claude Crépeau
1987Fast Spectral Tests for Measuring Nonrandomness and the DES.
Frank A. Feldman
1987Gradual and Verifiable Release of a Secret.
Ernest F. Brickell, David Chaum, Ivan Damgård, Jeroen van de Graaf
1987How to Make Replicated Data Secure.
Maurice Herlihy, J. D. Tygar
1987How to Solve any Protocol Problem - An Efficiency Improvement.
Oded Goldreich, Ronen Vainish
1987Identity-based Conference Key Distribution Systems.
Kenji Koyama, Kazuo Ohta
1987Integrating Cryptography in ISDN.
Kåre Presttun
1987Key Distribution Systems Based on Identification Information.
Eiji Okamoto
1987Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result.
David Chaum, Ivan Damgård, Jeroen van de Graaf
1987Multiparty Unconditionally Secure Protocols (Abstract).
David Chaum, Claude Crépeau, Ivan Damgård
1987Non-Interactive Zero-Knowledge Proof Systems.
Alfredo De Santis, Silvio Micali, Giuseppe Persiano
1987On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme.
T. R. N. Rao
1987On the F-function of FEAL.
Walter Fumy
1987On the Key Predistribution System: A Practical Solution to the Key Distribution Problem.
Tsutomu Matsumoto, Hideki Imai
1987Other Cycling Tests for DES (Abstract).
Jean-Jacques Quisquater, Jean-Paul Delescaille
1987Patterns of Entropy Drop of the Key in an S-Box of the DES.
Kencheng Zeng, Jun-Hui Yang, Z. T. Dai
1987Secret Distribution of Keys for Public-Key Systems.
Jean-Jacques Quisquater
1987Secure Audio Teleconference.
Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi
1987Security-Related Comments Regarding McEliece's Public-Key Cryptosystem.
Carlisle M. Adams, Henk Meijer
1987Society and Group Oriented Cryptography: A New Concept.
Yvo Desmedt
1987Special Uses and Abuses of the Fiat-Shamir Passport Protocol.
Yvo Desmedt, Claude Goutier, Samy Bengio
1987Standards for Data Security - A Change of Direction.
Wyn L. Price
1987Strong Practical Protocols.
Judy H. Moore
1987The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack.
René Struik, Johan van Tilburg