CRYPTO A*

39 papers

YearTitle / Authors
1992Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings
Joan Feigenbaum
1991A Calculus for Access Control in Distributed Systems.
Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin
1991A Cryptographic Scheme for Computerized Elections.
Kenneth R. Iversen
1991A Known Plaintext Attack of FEAL-4 and FEAL-6.
Anne Tardy-Corfdir, Henri Gilbert
1991A New ID-Based Key Sharing System.
Shigeo Tsujii, Jinhui Chao
1991A One-Round, Two-Prover, Zero-Knowledge Protocol for NP.
Dror Lapidot, Adi Shamir
1991A Switching Closure Test to Analyze Cryptosystems.
Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi
1991An Attack on the Last Two Rounds of MD4.
Bert den Boer, Antoon Bosselaers
1991CM-Curves with Good Cryptographic Properties.
Neal Koblitz
1991Combinatorial Characterizations of Authentication Codes.
Douglas R. Stinson
1991Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.
David Chaum, Eugène van Heijst, Birgit Pfitzmann
1991Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract).
Marie-Jeanne Toussaint
1991Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.
Eli Biham, Adi Shamir
1991Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems.
Tatsuaki Okamoto, Kouichi Sakurai
1991Efficient Multiparty Protocols Using Circuit Randomization.
Donald Beaver
1991Exploiting Parallelism in Hardware Implementations of the DES.
Albert G. Broscius, Jonathan M. Smith
1991Faster Modular Multiplication by Operand Scaling.
Colin D. Walter
1991Foundations of Secure Interactive Computing.
Donald Beaver
1991Functional Inversion and Communication Complexity.
Shang-Hua Teng
1991How To Break and Repair A "Provably Secure" Untraceable Payment System.
Birgit Pfitzmann, Michael Waidner
1991Interactive Proofs with Space Bounded Provers.
Joe Kilian, Ronitt Rubinfeld
1991Multiparty Secret Key Exchange Using a Random Deal of Cards.
Michael J. Fischer, Rebecca N. Wright
1991New Public-Key Schemes Based on Elliptic Curves over the Ring Z
Kenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone
1991New Results on Pseudorandom Permutation Generators Based on the DES Scheme.
Jacques Patarin
1991Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.
Charles Rackoff, Daniel R. Simon
1991Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.
Torben P. Pedersen
1991On Correlation-Immune Functions.
Paul Camion, Claude Carlet, Pascale Charpin, Nicolas Sendrier
1991On Verification in Secret Sharing.
Cynthia Dwork
1991On the Size of Shares for Secret Sharing Schemes.
Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro
1991Practical Quantum Oblivious Transfer.
Charles H. Bennett, Gilles Brassard, Claude Crépeau, Marie-Hélène Skubiszewska
1991Pseudo-random Generators from One-way Functions (Abstract).
Michael Luby
1991Secure Computation (Abstract).
Silvio Micali, Phillip Rogaway
1991Shared Generation of Authenticators and Signatures (Extended Abstract).
Yvo Desmedt, Yair Frankel
1991Systematic Design of Two-Party Authentication Protocols.
Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
1991The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks.
Yeow Meng Chee, Antoine Joux, Jacques Stern
1991The Use of Interaction in Public Cryptosystems (Extended Abstract).
Steven Rudich
1991Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks.
Ivan Damgård
1991Universal Electronic Cash.
Tatsuaki Okamoto, Kazuo Ohta
1991Universal Hashing and Authentication Codes.
Douglas R. Stinson