CRYPTO A*

61 papers

YearTitle / Authors
1990Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings
Gilles Brassard
1989A Certified Digital Signature.
Ralph C. Merkle
1989A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang.
Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle
1989A Design Principle for Hash Functions.
Ivan Damgård
1989A Fast Modular-multiplication Algorithm based on a Higher Radix.
Hikaru Morita
1989A Key Exchange System Based on Real Quadratic Fields.
Johannes Buchmann, Hugh C. Williams
1989A Signature with Shared Verification Scheme.
Marijke De Soete, Jean-Jacques Quisquater, Klaus Vedder
1989A Survey of Hardware Implementation of RSA (Abstract).
Ernest F. Brickell
1989Addition Chain Heuristics.
Jurjen N. Bos, Matthijs J. Coster
1989An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract).
Adi Shamir
1989An Efficient Software Protection Scheme.
Rafail Ostrovsky
1989Batch RSA.
Amos Fiat
1989Bit Commitment Using Pseudo-Randomness.
Moni Naor
1989Controlled Gradual Disclosure Schemes for Random Bits and Their Applications.
Richard Cleve
1989Covert Distributed Processing with Computer Viruses.
Steve R. White
1989Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash.
Tatsuaki Okamoto, Kazuo Ohta
1989Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space.
Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang
1989Efficient Identification Schemes Using Two Prover Interactive Proofs.
Michael Ben-Or, Shafi Goldwasser, Joe Kilian, Avi Wigderson
1989Efficient Identification and Signatures for Smart Cards.
Claus-Peter Schnorr
1989Flexible Access Control with Master Keys.
Gerald C. Chick, Stafford E. Tavares
1989Good S-Boxes Are Easy To Find.
Carlisle M. Adams, Stafford E. Tavares
1989How Easy is Collision Search. New Results and Applications to DES.
Jean-Jacques Quisquater, Jean-Paul Delescaille
1989How to Explain Zero-Knowledge Protocols to Your Children.
Jean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson
1989How to Predict Congruential Generators.
Hugo Krawczyk
1989Key Distribution Protocol for Digital Mobile Communication Systems.
Makoto Tatebayashi, Natsume Matsuzaki, David B. Newman Jr.
1989Keying the German Navy's Enigma.
David Kahn
1989Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context.
Yvo Desmedt
1989Minimum Resource Zero-Knowledge Proofs (Extended Abstract).
Joe Kilian, Silvio Micali, Rafail Ostrovsky
1989Modular Exponentiation Using Recursive Sums of Residues.
Paul A. Findlay, Brian A. Johnson
1989Multiparty Computation with Faulty Majority.
Donald Beaver, Shafi Goldwasser
1989Multiparty Protocols Tolerating Half Faulty Processors.
Donald Beaver
1989New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs.
Mihir Bellare, Shafi Goldwasser
1989Non-Interactive Oblivious Transfer and Applications.
Mihir Bellare, Silvio Micali
1989On Key Distribution Systems.
Yacov Yacobi, Zahava Shmuely
1989On the Classification of Idea Secret Sharing Schemes.
Ernest F. Brickell, Daniel M. Davenport
1989On the Concrete Complexity of Zero-Knowledge Proofs.
Joan Boyar, René Peralta
1989On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
1989On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs.
Ivan Damgård
1989On the Implementation of Elliptic Curve Cryptosystems.
Andreas Bender, Guy Castagnoli
1989On the Linear Consistency Test (LCT) in Cryptanalysis with Applications.
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
1989On the Quadratic Spans of Periodic Sequences.
Agnes Hui Chan, Richard A. Games
1989On the Structure of Secret Key Exchange Protocols.
Mihir Bellare, Lenore Cowen, Shafi Goldwasser
1989On-Line/Off-Line Digital Schemes.
Shimon Even, Oded Goldreich, Silvio Micali
1989One Way Hash Functions and DES.
Ralph C. Merkle
1989Perfect Local Randomness in Pseudo-Random Sequences.
Ueli M. Maurer, James L. Massey
1989Practical Problems with a Cryptographic Protection Scheme.
Jonathan M. Smith
1989Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks.
Russell L. Brand
1989Progress in Data Security Standardization.
Wyn L. Price
1989Properties of Cryptosystem PGM.
Spyros S. Magliveras, Nasir D. Memon
1989SDNS Architecture and End-to-End Encryption.
Ruth Nelson, John H. Heimann
1989Secret Sharing Over Infinite Domains (Extended Abstract).
Benny Chor, Eyal Kushilevitz
1989Sparse Pseudorandom Distributions.
Oded Goldreich, Hugo Krawczyk
1989The FEAL-8 Cryptosystem and a Call for Attack.
Shoji Miyaguchi
1989The Shortest Feedback Shift Register That Can Generate A Given Sequence.
Cees J. A. Jansen, Dick E. Boekee
1989The Smart Siskette - A Universal User Token and Personal Crypto-Engine.
Paul Barrett, Raymund Eisele
1989The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities.
David Chaum
1989The use of Encryption in Kerberos for Network Authentication.
John T. Kohl
1989Threshold Cryptosystems.
Yvo Desmedt, Yair Frankel
1989UNIX Password Security - Ten Years Later.
David C. Feldmeier, Philip R. Karn
1989Undeniable Signatures.
David Chaum, Hans Van Antwerpen
1989Zero Knowledge Proofs of Knowledge in Two Rounds.
Uriel Feige, Adi Shamir