Conferences in DBLP
Ernest F. Brickell , Judy H. Moore , M. R. Purtill Structure in the S-boxes of the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:3-8 [Conf ] Judy H. Moore , Gustavus J. Simmons Cycle Structures of the DES with Weak and Semi-Weak Keys. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:9-32 [Conf ] T. R. N. Rao , Kil-Hyun Nam Private-Key Algebraic-Coded Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:35-48 [Conf ] Wiebren de Jonge , David Chaum Some Variations on RSA Signatures and Their Security. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:49-59 [Conf ] N. S. James , Rudolf Lidl , Harald Niederreiter Breaking the Cade Cipher. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:60-63 [Conf ] John J. Cade A Modification of a Broken Public-Key Cipher. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:64-83 [Conf ] Burton S. Kaliski Jr. A Pseudo-Random Bit Generator Based on Elliptic Logarithms. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:84-103 [Conf ] Oded Goldreich Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:104-110 [Conf ] Yvo Desmedt , Jean-Jacques Quisquater Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:111-117 [Conf ] David Chaum , Jan-Hendrik Evertse A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:118-167 [Conf ] Oded Goldreich , Silvio Micali , Avi Wigderson How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:171-185 [Conf ] Amos Fiat , Adi Shamir How to Prove Yourself: Practical Solutions to Identification and Signature Problems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:186-194 [Conf ] David Chaum Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:195-199 [Conf ] David Chaum , Jan-Hendrik Evertse , Jeroen van de Graaf , René Peralta Demonstrating Possession of a Discrete Logarithm Without Revealing It. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:200-212 [Conf ] Josh Cohen Benaloh Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:213-222 [Conf ] Gilles Brassard , Claude Crépeau Zero-Knowledge Simulation of Boolean Circuits. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:223-233 [Conf ] Gilles Brassard , Claude Crépeau , Jean-Marc Robert All-or-Nothing Disclosure of Secrets. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:234-238 [Conf ] Claude Crépeau A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:239-247 [Conf ] Josh Cohen Benaloh Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:251-260 [Conf ] Martin Tompa , Heather Woll How to Share a Secret with Cheaters. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:261-265 [Conf ] G. R. Blakley , R. D. Dixon Smallest Possible Message Expansion in Threshold Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:266-274 [Conf ] Glenn A. Orton , M. P. Roy , P. A. Scott , Lloyd E. Peppard , Stafford E. Tavares VLSI Implementation of Public-Key Encryption Algorithms. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:277-301 [Conf ] Thomas Beth , B. M. Cook , Dieter Gollmann Architectures for Exponentiation in GF(2n ). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:302-310 [Conf ] Paul Barrett Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:311-323 [Conf ] Robert R. Jueneman A High Speed Manipulation Detection Code. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:327-346 [Conf ] Ralph Gyoery , Jennifer Seberry Electronic Funds Transfer Point of Sale in Australia. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:347-377 [Conf ] Silvio Micali , Charles Rackoff , Bob Sloan The Notion of Security for Probabilistic Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:381-392 [Conf ] Neal R. Wagner , Paul Putter , Marianne R. Cain Large-Scale Randomization Techniques. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:393-404 [Conf ] Agnes Hui Chan , Richard A. Games On the Linear Span of binary Sequences Obtained from Finite Geometries. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:405-417 [Conf ] Douglas R. Stinson Some Constructions and Bounds for authentication Codes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:418-425 [Conf ] Oded Goldreich Towards a Theory of Software Protection. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:426-439 [Conf ] Pierre Beauchemin , Gilles Brassard , Claude Crépeau Two Observations on Probabilistic Primality Testing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:443-450 [Conf ] Stephen M. Matyas Public-Key Registration. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:451-458 [Conf ] Yvo Desmedt Is There an ultimate Use of Cryptography? [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:459-463 [Conf ] Louis C. Guillou , Michel Ugon Smart Card, a Highly Reliable and Portable Security Device. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:464-479 [Conf ] Gordon Rankine THOMAS - A Complete Single Chip RSA Device. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:480-487 [Conf ]