The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1988 (conf/crypto/1988)

  1. Claude Crépeau, Joe Kilian
    Weakening Security Assumptions and Oblivious Transfer (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:2-7 [Conf]
  2. Russell Impagliazzo, Steven Rudich
    Limits on the Provable Consequences of One-way Permutations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:8-26 [Conf]
  3. Josh Cohen Benaloh, Jerry Leichter
    Generalized Secret Sharing and Monotone Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:27-35 [Conf]
  4. Michael Ben-Or, Oded Goldreich, Shafi Goldwasser, Johan Håstad, Joe Kilian, Silvio Micali, Phillip Rogaway
    Everything Provable is Provable in Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:37-56 [Conf]
  5. Oded Goldreich, Eyal Kushilevitz
    A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:57-70 [Conf]
  6. Cynthia Dwork, Larry J. Stockmeyer
    Zero-Knowledge With Finite State Verifiers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:71-75 [Conf]
  7. Eric Bach
    Intractable Problems in Number Theory. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:77-93 [Conf]
  8. Neal Koblitz
    A Family of Jacobians Suitable for Discrete Log Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:94-99 [Conf]
  9. Marc Girault, Philippe Toffin, Brigitte Vallée
    Computation of Approximate L-th Roots Modulo n and Application to Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:100-117 [Conf]
  10. Johan van Tilburg
    On the McEliece Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:119-131 [Conf]
  11. Michael Lucks
    A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:132-144 [Conf]
  12. Oded Goldreich, Hugo Krawczyk, Michael Luby
    On the Existence of Pseudorandom Generators. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:146-162 [Conf]
  13. Ivan Damgård
    On the Randomness of Legendre and Jacobi Sequences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:163-172 [Conf]
  14. Silvio Micali, Claus-Peter Schnorr
    Efficient, Perfect Random Number Generators. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:173-198 [Conf]
  15. Mihir Bellare, Silvio Micali
    How To Sign Given Any Trapdoor Function. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:200-215 [Conf]
  16. Louis C. Guillou, Jean-Jacques Quisquater
    A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:216-231 [Conf]
  17. Kazuo Ohta, Tatsuaki Okamoto
    A Modification of the Fiat-Shamir Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:232-243 [Conf]
  18. Silvio Micali, Adi Shamir
    An Improvement of the Fiat-Shamir Identification and Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:244-247 [Conf]
  19. Charles Rackoff
    A Basic Theory of Public and Private Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:249-255 [Conf]
  20. Manuel Blum, Paul Feldman, Silvio Micali
    Proving Security Against Chosen Cyphertext Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:256-268 [Conf]
  21. Alfredo De Santis, Silvio Micali, Giuseppe Persiano
    Non-Interactive Zero-Knowledge with Preprocessing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:269-282 [Conf]
  22. Uriel Feige, Adi Shamir, Moshe Tennenholtz
    The Noisy Oracle Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:284-296 [Conf]
  23. Martín Abadi, Eric Allender, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra
    On Generating Solved Instances of Computational Problems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:297-310 [Conf]
  24. Marijke De Soete
    Bounds and Constructions for Authentication-Secrecy Codes with Splitting. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:311-317 [Conf]
  25. David Chaum, Amos Fiat, Moni Naor
    Untraceable Electronic Cash. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1988, pp:319-327 [Conf]
  26. Ivan Damgård
    Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:328-335 [Conf]
  27. Ming-Deh A. Huang, Shang-Hua Teng
    A Universal Problem in Secure and Verifiable Distributed Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:336-352 [Conf]
  28. Leonard M. Adleman
    An Abstract Theory of Computer Viruses. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:354-374 [Conf]
  29. Yvo Desmedt
    Abuses in Cryptography and How to Fight Them. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:375-389 [Conf]
  30. Gustavus J. Simmons
    How to (Really) Share a Secret. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:390-448 [Conf]
  31. Réjane Forré
    The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:450-468 [Conf]
  32. Kencheng Zeng, Minqiang Huang
    On the Linear Syndrome Method in Cryptoanalysis. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:469-478 [Conf]
  33. Richard T. C. Kwok, Maurice Beale
    Aperiodic Linear Complexities of de Bruijn Sequences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:479-482 [Conf]
  34. J. R. Sherwood, V. A. Gallo
    The Application of Smart Cards for RSA Digital Signatures in a Network Comprising both Interactive and Store-and-Foreward Facilities. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:484-496 [Conf]
  35. Tsutomu Matsumoto, Koki Kato, Hideki Imai
    Speeding Up Secret Computations with Insecure Auxiliary Devices. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:497-506 [Conf]
  36. B. J. Herbison
    Developing Ethernet Enhanced-Security System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:507-519 [Conf]
  37. D. G. Steer, L. Strawczynski, Whitfield Diffie, Michael J. Wiener
    A Secure Audio Teleconference System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:520-528 [Conf]
  38. Bert den Boer
    Diffie-Hillman is as Strong as Discrete Log for Certain Primes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:530-539 [Conf]
  39. Tzonelih Hwang, T. R. N. Rao
    Secret Error-Correcting Codes (SECC). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:540-563 [Conf]
  40. Ernest F. Brickell, Douglas R. Stinson
    The Detection of Cheaters in Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:564-577 [Conf]
  41. Stuart A. Kurtz, Stephen R. Mahaney, James S. Royer
    On the Power of 1-way Functions (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:578-579 [Conf]
  42. Gilles Brassard, Ivan Damgård
    "Practical IP" <= MA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:580-582 [Conf]
  43. Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen
    Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:583-588 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002