The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1987 (conf/crypto/1987)

  1. Wyn L. Price
    Standards for Data Security - A Change of Direction. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:3-8 [Conf]
  2. Kåre Presttun
    Integrating Cryptography in ISDN. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:9-18 [Conf]
  3. Yvo Desmedt, Claude Goutier, Samy Bengio
    Special Uses and Abuses of the Fiat-Shamir Passport Protocol. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:21-39 [Conf]
  4. Russell Impagliazzo, Moti Yung
    Direct Minimum-Knowledge Computations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:40-51 [Conf]
  5. Alfredo De Santis, Silvio Micali, Giuseppe Persiano
    Non-Interactive Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:52-72 [Conf]
  6. Oded Goldreich, Ronen Vainish
    How to Solve any Protocol Problem - An Efficiency Improvement. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:73-86 [Conf]
  7. David Chaum, Ivan Damgård, Jeroen van de Graaf
    Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:87-119 [Conf]
  8. Yvo Desmedt
    Society and Group Oriented Cryptography: A New Concept. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:120-127 [Conf]
  9. Jeroen van de Graaf, René Peralta
    A Simple and Secure Way to Show the Validity of Your Public Key. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:128-134 [Conf]
  10. Zvi Galil, Stuart Haber, Moti Yung
    Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:135-155 [Conf]
  11. Ernest F. Brickell, David Chaum, Ivan Damgård, Jeroen van de Graaf
    Gradual and Verifiable Release of a Secret. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:156-166 [Conf]
  12. Judy H. Moore
    Strong Practical Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:167-172 [Conf]
  13. Kenji Koyama, Kazuo Ohta
    Identity-based Conference Key Distribution Systems. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1987, pp:175-184 [Conf]
  14. Tsutomu Matsumoto, Hideki Imai
    On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:185-193 [Conf]
  15. Eiji Okamoto
    Key Distribution Systems Based on Identification Information. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1987, pp:194-202 [Conf]
  16. Jean-Jacques Quisquater
    Secret Distribution of Keys for Public-Key Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:203-208 [Conf]
  17. Gustavus J. Simmons
    An Impersonation-Proof Identity Verfication Scheme. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1987, pp:211-215 [Conf]
  18. George I. Davida, Brian J. Matt
    Arbitration in Tamper Proof Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:216-222 [Conf]
  19. Louis C. Guillou, Jean-Jacques Quisquater
    Efficient Digital Public-Key Signature with Shadow (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:223- [Conf]
  20. Carlisle M. Adams, Henk Meijer
    Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:224-228 [Conf]
  21. John M. DeLaurentis
    Components and Cycles of a Random Function. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:231-242 [Conf]
  22. Frank A. Feldman
    Fast Spectral Tests for Measuring Nonrandomness and the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:243-254 [Conf]
  23. Jean-Jacques Quisquater, Jean-Paul Delescaille
    Other Cycling Tests for DES (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:255-256 [Conf]
  24. George I. Davida, Frank B. Dancs
    A Crypto-Engine. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:257-268 [Conf]
  25. Gustavus J. Simmons
    A Natural Taxonomy for Digital Information Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:269-288 [Conf]
  26. Richard A. Kemmerer
    Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:289-305 [Conf]
  27. G. R. Blakley, William Rundell
    Cryptosystems Based on an Analog of Heat Flow. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:306-329 [Conf]
  28. Douglas R. Stinson, Scott A. Vanstone
    A Combinatorial Approach to Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:330-339 [Conf]
  29. Hatsukazu Tanaka
    A Realization Scheme for the Identity-Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:340-349 [Conf]
  30. Claude Crépeau
    Equivalence Between Two Flavours of Oblivious Transfers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:350-354 [Conf]
  31. Douglas R. Stinson
    A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:355-366 [Conf]
  32. Ralph C. Merkle
    A Digital Signature Based on a Conventional Encryption Function. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:369-378 [Conf]
  33. Maurice Herlihy, J. D. Tygar
    How to Make Replicated Data Secure. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:379-391 [Conf]
  34. Michael Luby, Charles Rackoff
    A Study of Password Security. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:392-397 [Conf]
  35. Yossi Matias, Adi Shamir
    A Video Scrambling Technique Based On Space Filling Curves. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:398-417 [Conf]
  36. Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi
    Secure Audio Teleconference. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:418-426 [Conf]
  37. Yacov Yacobi
    Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:429-433 [Conf]
  38. Walter Fumy
    On the F-function of FEAL. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:434-437 [Conf]
  39. Kencheng Zeng, Jun-Hui Yang, Z. T. Dai
    Patterns of Entropy Drop of the Key in an S-Box of the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:438-444 [Conf]
  40. René Struik, Johan van Tilburg
    The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:445-457 [Conf]
  41. T. R. N. Rao
    On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:458-460 [Conf]
  42. Pierre Beauchemin, Gilles Brassard
    A Generalization of Hellman's Extension of Shannon's Approach to Cryptography (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:461- [Conf]
  43. David Chaum, Claude Crépeau, Ivan Damgård
    Multiparty Unconditionally Secure Protocols (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:462- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002