Conferences in DBLP
Claude Crépeau , Joe Kilian Weakening Security Assumptions and Oblivious Transfer (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:2-7 [Conf ] Russell Impagliazzo , Steven Rudich Limits on the Provable Consequences of One-way Permutations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:8-26 [Conf ] Josh Cohen Benaloh , Jerry Leichter Generalized Secret Sharing and Monotone Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:27-35 [Conf ] Michael Ben-Or , Oded Goldreich , Shafi Goldwasser , Johan Håstad , Joe Kilian , Silvio Micali , Phillip Rogaway Everything Provable is Provable in Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:37-56 [Conf ] Oded Goldreich , Eyal Kushilevitz A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:57-70 [Conf ] Cynthia Dwork , Larry J. Stockmeyer Zero-Knowledge With Finite State Verifiers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:71-75 [Conf ] Eric Bach Intractable Problems in Number Theory. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:77-93 [Conf ] Neal Koblitz A Family of Jacobians Suitable for Discrete Log Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:94-99 [Conf ] Marc Girault , Philippe Toffin , Brigitte Vallée Computation of Approximate L-th Roots Modulo n and Application to Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:100-117 [Conf ] Johan van Tilburg On the McEliece Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:119-131 [Conf ] Michael Lucks A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:132-144 [Conf ] Oded Goldreich , Hugo Krawczyk , Michael Luby On the Existence of Pseudorandom Generators. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:146-162 [Conf ] Ivan Damgård On the Randomness of Legendre and Jacobi Sequences. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:163-172 [Conf ] Silvio Micali , Claus-Peter Schnorr Efficient, Perfect Random Number Generators. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:173-198 [Conf ] Mihir Bellare , Silvio Micali How To Sign Given Any Trapdoor Function. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:200-215 [Conf ] Louis C. Guillou , Jean-Jacques Quisquater A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:216-231 [Conf ] Kazuo Ohta , Tatsuaki Okamoto A Modification of the Fiat-Shamir Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:232-243 [Conf ] Silvio Micali , Adi Shamir An Improvement of the Fiat-Shamir Identification and Signature Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:244-247 [Conf ] Charles Rackoff A Basic Theory of Public and Private Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:249-255 [Conf ] Manuel Blum , Paul Feldman , Silvio Micali Proving Security Against Chosen Cyphertext Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:256-268 [Conf ] Alfredo De Santis , Silvio Micali , Giuseppe Persiano Non-Interactive Zero-Knowledge with Preprocessing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:269-282 [Conf ] Uriel Feige , Adi Shamir , Moshe Tennenholtz The Noisy Oracle Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:284-296 [Conf ] Martín Abadi , Eric Allender , Andrei Z. Broder , Joan Feigenbaum , Lane A. Hemachandra On Generating Solved Instances of Computational Problems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:297-310 [Conf ] Marijke De Soete Bounds and Constructions for Authentication-Secrecy Codes with Splitting. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:311-317 [Conf ] David Chaum , Amos Fiat , Moni Naor Untraceable Electronic Cash. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1988, pp:319-327 [Conf ] Ivan Damgård Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:328-335 [Conf ] Ming-Deh A. Huang , Shang-Hua Teng A Universal Problem in Secure and Verifiable Distributed Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:336-352 [Conf ] Leonard M. Adleman An Abstract Theory of Computer Viruses. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:354-374 [Conf ] Yvo Desmedt Abuses in Cryptography and How to Fight Them. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:375-389 [Conf ] Gustavus J. Simmons How to (Really) Share a Secret. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:390-448 [Conf ] Réjane Forré The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:450-468 [Conf ] Kencheng Zeng , Minqiang Huang On the Linear Syndrome Method in Cryptoanalysis. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:469-478 [Conf ] Richard T. C. Kwok , Maurice Beale Aperiodic Linear Complexities of de Bruijn Sequences. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:479-482 [Conf ] J. R. Sherwood , V. A. Gallo The Application of Smart Cards for RSA Digital Signatures in a Network Comprising both Interactive and Store-and-Foreward Facilities. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:484-496 [Conf ] Tsutomu Matsumoto , Koki Kato , Hideki Imai Speeding Up Secret Computations with Insecure Auxiliary Devices. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:497-506 [Conf ] B. J. Herbison Developing Ethernet Enhanced-Security System. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:507-519 [Conf ] D. G. Steer , L. Strawczynski , Whitfield Diffie , Michael J. Wiener A Secure Audio Teleconference System. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:520-528 [Conf ] Bert den Boer Diffie-Hillman is as Strong as Discrete Log for Certain Primes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:530-539 [Conf ] Tzonelih Hwang , T. R. N. Rao Secret Error-Correcting Codes (SECC). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:540-563 [Conf ] Ernest F. Brickell , Douglas R. Stinson The Detection of Cheaters in Threshold Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:564-577 [Conf ] Stuart A. Kurtz , Stephen R. Mahaney , James S. Royer On the Power of 1-way Functions (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:578-579 [Conf ] Gilles Brassard , Ivan Damgård "Practical IP" <= MA. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:580-582 [Conf ] Jørgen Brandt , Ivan Damgård , Peter Landrock , Torben P. Pedersen Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:583-588 [Conf ]