Conferences in DBLP
Wyn L. Price Standards for Data Security - A Change of Direction. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:3-8 [Conf ] Kåre Presttun Integrating Cryptography in ISDN. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:9-18 [Conf ] Yvo Desmedt , Claude Goutier , Samy Bengio Special Uses and Abuses of the Fiat-Shamir Passport Protocol. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:21-39 [Conf ] Russell Impagliazzo , Moti Yung Direct Minimum-Knowledge Computations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:40-51 [Conf ] Alfredo De Santis , Silvio Micali , Giuseppe Persiano Non-Interactive Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:52-72 [Conf ] Oded Goldreich , Ronen Vainish How to Solve any Protocol Problem - An Efficiency Improvement. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:73-86 [Conf ] David Chaum , Ivan Damgård , Jeroen van de Graaf Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:87-119 [Conf ] Yvo Desmedt Society and Group Oriented Cryptography: A New Concept. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:120-127 [Conf ] Jeroen van de Graaf , René Peralta A Simple and Secure Way to Show the Validity of Your Public Key. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:128-134 [Conf ] Zvi Galil , Stuart Haber , Moti Yung Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:135-155 [Conf ] Ernest F. Brickell , David Chaum , Ivan Damgård , Jeroen van de Graaf Gradual and Verifiable Release of a Secret. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:156-166 [Conf ] Judy H. Moore Strong Practical Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:167-172 [Conf ] Kenji Koyama , Kazuo Ohta Identity-based Conference Key Distribution Systems. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1987, pp:175-184 [Conf ] Tsutomu Matsumoto , Hideki Imai On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:185-193 [Conf ] Eiji Okamoto Key Distribution Systems Based on Identification Information. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1987, pp:194-202 [Conf ] Jean-Jacques Quisquater Secret Distribution of Keys for Public-Key Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:203-208 [Conf ] Gustavus J. Simmons An Impersonation-Proof Identity Verfication Scheme. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1987, pp:211-215 [Conf ] George I. Davida , Brian J. Matt Arbitration in Tamper Proof Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:216-222 [Conf ] Louis C. Guillou , Jean-Jacques Quisquater Efficient Digital Public-Key Signature with Shadow (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:223- [Conf ] Carlisle M. Adams , Henk Meijer Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:224-228 [Conf ] John M. DeLaurentis Components and Cycles of a Random Function. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:231-242 [Conf ] Frank A. Feldman Fast Spectral Tests for Measuring Nonrandomness and the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:243-254 [Conf ] Jean-Jacques Quisquater , Jean-Paul Delescaille Other Cycling Tests for DES (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:255-256 [Conf ] George I. Davida , Frank B. Dancs A Crypto-Engine. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:257-268 [Conf ] Gustavus J. Simmons A Natural Taxonomy for Digital Information Authentication Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:269-288 [Conf ] Richard A. Kemmerer Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:289-305 [Conf ] G. R. Blakley , William Rundell Cryptosystems Based on an Analog of Heat Flow. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:306-329 [Conf ] Douglas R. Stinson , Scott A. Vanstone A Combinatorial Approach to Threshold Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:330-339 [Conf ] Hatsukazu Tanaka A Realization Scheme for the Identity-Based Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:340-349 [Conf ] Claude Crépeau Equivalence Between Two Flavours of Oblivious Transfers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:350-354 [Conf ] Douglas R. Stinson A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:355-366 [Conf ] Ralph C. Merkle A Digital Signature Based on a Conventional Encryption Function. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:369-378 [Conf ] Maurice Herlihy , J. D. Tygar How to Make Replicated Data Secure. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:379-391 [Conf ] Michael Luby , Charles Rackoff A Study of Password Security. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:392-397 [Conf ] Yossi Matias , Adi Shamir A Video Scrambling Technique Based On Space Filling Curves. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:398-417 [Conf ] Ernest F. Brickell , Pil Joong Lee , Yacov Yacobi Secure Audio Teleconference. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:418-426 [Conf ] Yacov Yacobi Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:429-433 [Conf ] Walter Fumy On the F-function of FEAL. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:434-437 [Conf ] Kencheng Zeng , Jun-Hui Yang , Z. T. Dai Patterns of Entropy Drop of the Key in an S-Box of the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:438-444 [Conf ] René Struik , Johan van Tilburg The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:445-457 [Conf ] T. R. N. Rao On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:458-460 [Conf ] Pierre Beauchemin , Gilles Brassard A Generalization of Hellman's Extension of Shannon's Approach to Cryptography (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:461- [Conf ] David Chaum , Claude Crépeau , Ivan Damgård Multiparty Unconditionally Secure Protocols (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:462- [Conf ]