Conferences in DBLP
David Kahn Keying the German Navy's Enigma. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:2-5 [Conf ] Yvo Desmedt Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:6-16 [Conf ] Ivan Damgård On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:17-27 [Conf ] Russell L. Brand Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:30-34 [Conf ] John T. Kohl The use of Encryption in Kerberos for Network Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:35-43 [Conf ] David C. Feldmeier , Philip R. Karn UNIX Password Security - Ten Years Later. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:44-63 [Conf ] Jonathan M. Smith Practical Problems with a Cryptographic Protection Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:64-73 [Conf ] Paul Barrett , Raymund Eisele The Smart Siskette - A Universal User Token and Personal Crypto-Engine. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:74-79 [Conf ] Agnes Hui Chan , Richard A. Games On the Quadratic Spans of Periodic Sequences. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:82-89 [Conf ] Cees J. A. Jansen , Dick E. Boekee The Shortest Feedback Shift Register That Can Generate A Given Sequence. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:90-99 [Conf ] Ueli M. Maurer , James L. Massey Perfect Local Randomness in Pseudo-Random Sequences. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:100-112 [Conf ] Oded Goldreich , Hugo Krawczyk Sparse Pseudorandom Distributions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:113-127 [Conf ] Moni Naor Bit Commitment Using Pseudo-Randomness. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:128-136 [Conf ] Hugo Krawczyk How to Predict Congruential Generators. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:138-153 [Conf ] Bart Preneel , Antoon Bosselaers , René Govaerts , Joos Vandewalle A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:154-163 [Conf ] Kencheng Zeng , Chung-Huang Yang , T. R. N. Rao On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:164-174 [Conf ] Amos Fiat Batch RSA. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:175-185 [Conf ] Andreas Bender , Guy Castagnoli On the Implementation of Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:186-192 [Conf ] Mihir Bellare , Shafi Goldwasser New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:194-211 [Conf ] David Chaum , Hans Van Antwerpen Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:212-216 [Conf ] Ralph C. Merkle A Certified Digital Signature. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:218-238 [Conf ] Claus-Peter Schnorr Efficient Identification and Signatures for Smart Cards. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:239-252 [Conf ] Marijke De Soete , Jean-Jacques Quisquater , Klaus Vedder A Signature with Shared Verification Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:253-262 [Conf ] Shimon Even , Oded Goldreich , Silvio Micali On-Line/Off-Line Digital Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:263-275 [Conf ] Ernest F. Brickell , Daniel M. Davenport On the Classification of Idea Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:278-285 [Conf ] Chi-Sung Laih , Lein Harn , Jau-Yien Lee , Tzonelih Hwang Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:286-298 [Conf ] Benny Chor , Eyal Kushilevitz Secret Sharing Over Infinite Domains (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:299-306 [Conf ] Yvo Desmedt , Yair Frankel Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:307-315 [Conf ] Gerald C. Chick , Stafford E. Tavares Flexible Access Control with Master Keys. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:316-322 [Conf ] Makoto Tatebayashi , Natsume Matsuzaki , David B. Newman Jr. Key Distribution Protocol for Digital Mobile Communication Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:324-334 [Conf ] Johannes Buchmann , Hugh C. Williams A Key Exchange System Based on Real Quadratic Fields. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:335-343 [Conf ] Yacov Yacobi , Zahava Shmuely On Key Distribution Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:344-355 [Conf ] Ruth Nelson , John Heimann SDNS Architecture and End-to-End Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:356-366 [Conf ] Ernest F. Brickell A Survey of Hardware Implementation of RSA (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:368-370 [Conf ] Paul A. Findlay , Brian A. Johnson Modular Exponentiation Using Recursive Sums of Residues. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:371-386 [Conf ] Hikaru Morita A Fast Modular-multiplication Algorithm based on a Higher Radix. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:387-399 [Conf ] Jurjen N. Bos , Matthijs J. Coster Addition Chain Heuristics. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:400-407 [Conf ] Jean-Jacques Quisquater , Jean-Paul Delescaille How Easy is Collision Search. New Results and Applications to DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:408-413 [Conf ] Ivan Damgård A Design Principle for Hash Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:416-427 [Conf ] Ralph C. Merkle One Way Hash Functions and DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:428-446 [Conf ] Spyros S. Magliveras , Nasir D. Memon Properties of Cryptosystem PGM. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:447-460 [Conf ] Yuliang Zheng , Tsutomu Matsumoto , Hideki Imai On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:461-480 [Conf ] Tatsuaki Okamoto , Kazuo Ohta Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:481-496 [Conf ] Michael Ben-Or , Shafi Goldwasser , Joe Kilian , Avi Wigderson Efficient Identification Schemes Using Two Prover Interactive Proofs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:498-506 [Conf ] Joan Boyar , René Peralta On the Concrete Complexity of Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:507-525 [Conf ] Uriel Feige , Adi Shamir Zero Knowledge Proofs of Knowledge in Two Rounds. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:526-544 [Conf ] Joe Kilian , Silvio Micali , Rafail Ostrovsky Minimum Resource Zero-Knowledge Proofs (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:545-546 [Conf ] Mihir Bellare , Silvio Micali Non-Interactive Oblivious Transfer and Spplications. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:547-557 [Conf ] Donald Beaver Multiparty Protocols Tolerating Half Faulty Processors. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:560-572 [Conf ] Richard Cleve Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:573-588 [Conf ] Donald Beaver , Shafi Goldwasser Multiparty Computation with Faulty Majority. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:589-590 [Conf ] David Chaum The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:591-602 [Conf ] Mihir Bellare , Lenore Cowen , Shafi Goldwasser On the Structure of Secret Key Exchange Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:604-605 [Conf ] Adi Shamir An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:606-609 [Conf ] Rafail Ostrovsky An Efficient Software Protection Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:610-611 [Conf ] Carlisle M. Adams , Stafford E. Tavares Good S-Boxes Are Easy To Find. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:612-615 [Conf ] Steve R. White Covert Distributed Processing with Computer Viruses. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:616-619 [Conf ] Wyn L. Price Progress in Data Security Standardization. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:620-623 [Conf ] Shoji Miyaguchi The FEAL-8 Cryptosystem and a Call for Attack. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:624-627 [Conf ] Jean-Jacques Quisquater , Myriam Quisquater , Muriel Quisquater , Michaël Quisquater , Louis C. Guillou , Marie Annick Guillou , Gaïd Guillou , Anna Guillou , Gwenolé Guillou , Soazig Guillou , Thomas A. Berson How to Explain Zero-Knowledge Protocols to Your Children. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:628-631 [Conf ]