The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1986 (conf/crypto/1986)

  1. Ernest F. Brickell, Judy H. Moore, M. R. Purtill
    Structure in the S-boxes of the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:3-8 [Conf]
  2. Judy H. Moore, Gustavus J. Simmons
    Cycle Structures of the DES with Weak and Semi-Weak Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:9-32 [Conf]
  3. T. R. N. Rao, Kil-Hyun Nam
    Private-Key Algebraic-Coded Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:35-48 [Conf]
  4. Wiebren de Jonge, David Chaum
    Some Variations on RSA Signatures and Their Security. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:49-59 [Conf]
  5. N. S. James, Rudolf Lidl, Harald Niederreiter
    Breaking the Cade Cipher. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:60-63 [Conf]
  6. John J. Cade
    A Modification of a Broken Public-Key Cipher. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:64-83 [Conf]
  7. Burton S. Kaliski Jr.
    A Pseudo-Random Bit Generator Based on Elliptic Logarithms. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:84-103 [Conf]
  8. Oded Goldreich
    Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:104-110 [Conf]
  9. Yvo Desmedt, Jean-Jacques Quisquater
    Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:111-117 [Conf]
  10. David Chaum, Jan-Hendrik Evertse
    A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:118-167 [Conf]
  11. Oded Goldreich, Silvio Micali, Avi Wigderson
    How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:171-185 [Conf]
  12. Amos Fiat, Adi Shamir
    How to Prove Yourself: Practical Solutions to Identification and Signature Problems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:186-194 [Conf]
  13. David Chaum
    Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:195-199 [Conf]
  14. David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf, René Peralta
    Demonstrating Possession of a Discrete Logarithm Without Revealing It. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:200-212 [Conf]
  15. Josh Cohen Benaloh
    Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:213-222 [Conf]
  16. Gilles Brassard, Claude Crépeau
    Zero-Knowledge Simulation of Boolean Circuits. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:223-233 [Conf]
  17. Gilles Brassard, Claude Crépeau, Jean-Marc Robert
    All-or-Nothing Disclosure of Secrets. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:234-238 [Conf]
  18. Claude Crépeau
    A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:239-247 [Conf]
  19. Josh Cohen Benaloh
    Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:251-260 [Conf]
  20. Martin Tompa, Heather Woll
    How to Share a Secret with Cheaters. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:261-265 [Conf]
  21. G. R. Blakley, R. D. Dixon
    Smallest Possible Message Expansion in Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:266-274 [Conf]
  22. Glenn A. Orton, M. P. Roy, P. A. Scott, Lloyd E. Peppard, Stafford E. Tavares
    VLSI Implementation of Public-Key Encryption Algorithms. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:277-301 [Conf]
  23. Thomas Beth, B. M. Cook, Dieter Gollmann
    Architectures for Exponentiation in GF(2n). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:302-310 [Conf]
  24. Paul Barrett
    Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:311-323 [Conf]
  25. Robert R. Jueneman
    A High Speed Manipulation Detection Code. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:327-346 [Conf]
  26. Ralph Gyoery, Jennifer Seberry
    Electronic Funds Transfer Point of Sale in Australia. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:347-377 [Conf]
  27. Silvio Micali, Charles Rackoff, Bob Sloan
    The Notion of Security for Probabilistic Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:381-392 [Conf]
  28. Neal R. Wagner, Paul Putter, Marianne R. Cain
    Large-Scale Randomization Techniques. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:393-404 [Conf]
  29. Agnes Hui Chan, Richard A. Games
    On the Linear Span of binary Sequences Obtained from Finite Geometries. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:405-417 [Conf]
  30. Douglas R. Stinson
    Some Constructions and Bounds for authentication Codes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:418-425 [Conf]
  31. Oded Goldreich
    Towards a Theory of Software Protection. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:426-439 [Conf]
  32. Pierre Beauchemin, Gilles Brassard, Claude Crépeau
    Two Observations on Probabilistic Primality Testing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:443-450 [Conf]
  33. Stephen M. Matyas
    Public-Key Registration. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:451-458 [Conf]
  34. Yvo Desmedt
    Is There an ultimate Use of Cryptography? [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:459-463 [Conf]
  35. Louis C. Guillou, Michel Ugon
    Smart Card, a Highly Reliable and Portable Security Device. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:464-479 [Conf]
  36. Gordon Rankine
    THOMAS - A Complete Single Chip RSA Device. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:480-487 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002