CRYPTO A*

48 papers

YearTitle / Authors
1991Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings
Alfred Menezes, Scott A. Vanstone
1990A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms.
Paul C. van Oorschot
1990A Key Distribution "Paradox".
Yacov Yacobi
1990A Modular Approach to Key Distribution.
Walter Fumy, Michael Munzert
1990A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion.
Kwangjo Kim, Tsutomu Matsumoto, Hideki Imai
1990A Statistical Attack of the FEAL-8 Cryptosystem.
Henri Gilbert, Guy Chassé
1990A Universal Statistical Test for Random Bit Generators.
Ueli M. Maurer
1990Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract).
Yvo Desmedt, Moti Yung
1990Achieving Zero-Knowledge Robustly.
Joe Kilian
1990An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications.
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
1990CORSAIR: A SMART Card for Public Key Cryptosystems.
Dominique de Waleffe, Jean-Jacques Quisquater
1990Collective Coin Tossing Without Assumptions nor Broadcasting.
Silvio Micali, Tal Rabin
1990Complexity Theoretic Issues Concerning Block Ciphers Related to D.E.S.
Richard Cleve
1990Computation of Discrete Logarithms in Prime Fields (Extended Abstract).
Brian A. LaMacchia, Andrew M. Odlyzko
1990Constructing Elliptic Curve Cryptosystems in Characteristic 2.
Neal Koblitz
1990Convertible Undeniable Signatures.
Joan Boyar, David Chaum, Ivan Damgård, Torben P. Pedersen
1990Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems.
Alfredo De Santis, Moti Yung
1990Cryptographic Significance of the Carry for Ciphers Based on Integer Addition.
Othmar Staffelbach, Willi Meier
1990Differential Cryptanalysis of DES-like Cryptosystems.
Eli Biham, Adi Shamir
1990Discrete-Log With Compressible Exponents.
Yacov Yacobi
1990Fair Computation of General Functions in Presence of Immoral Majority.
Shafi Goldwasser, Leonid A. Levin
1990Fast Checkers for Cryptography.
Kireeti Kompella, Leonard M. Adleman
1990Fast Software Encryption Functions.
Ralph C. Merkle
1990Finding Four Million Large Random Primes.
Ronald L. Rivest
1990Geometric Shared Secret and/or Shared Control Schemes.
Gustavus J. Simmons
1990Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract).
Donald Beaver, Joan Feigenbaum, Victor Shoup
1990How to Time-Stamp a Digital Document.
Stuart Haber, W. Scott Stornetta
1990How to Utilize the Randomness of Zero-Knowledge Proofs.
Tatsuaki Okamoto, Kazuo Ohta
1990Identification Tokens - or: Solving the Chess Grandmaster Problem.
Thomas Beth, Yvo Desmedt
1990Interactive Proofs with Provable Security Against Honest Verifiers.
Joe Kilian
1990Matrix Extensions of the RSA Algorithm.
Chih-Chwen Chuang, James George Dunham
1990Multi-Language Zero Knowledge Interactive Proof Systems.
Kaoru Kurosawa, Shigeo Tsujii
1990Nonlinear Parity Circuits and their Cryptographic Applications.
Kenji Koyama, Routo Terada
1990On the Computation of Discrete Logarithms in Class Groups.
Johannes A. Buchmann, Stephan Düllmann
1990On the Impossibility of Private Key Cryptography with Weakly Random Keys.
James L. McInnes, Benny Pinkas
1990On the Universality of the Next Bit Test.
A. W. Schrift, Adi Shamir
1990One-Way Group Actions.
Gilles Brassard, Moti Yung
1990Publicly Verifiable Non-Interactive Zero-Knowledge Proofs.
Dror Lapidot, Adi Shamir
1990Quantum Bit Commitment and Coin Tossing Protocols.
Gilles Brassard, Claude Crépeau
1990Security with Low Communication Overhead.
Donald Beaver, Joan Feigenbaum, Joe Kilian, Phillip Rogaway
1990Solving Large Sparse Linear Systems over Finite Fields.
Brian A. LaMacchia, Andrew M. Odlyzko
1990Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes.
Ernest F. Brickell, Douglas R. Stinson
1990Structural Properties of One-way Hash Functions.
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
1990Systolic Modular Multiplication.
Shimon Even
1990The FEAL Cipher Family.
Shoji Miyaguchi
1990The MD4 Message Digest Algorithm.
Ronald L. Rivest
1990The REDOC II Cryptosystem.
Thomas W. Cusick, Michael C. Wood
1990Unconditionally Secure Digital Signatures.
David Chaum, Sandra Roijakkers