The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1989 (conf/crypto/1989)

  1. David Kahn
    Keying the German Navy's Enigma. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:2-5 [Conf]
  2. Yvo Desmedt
    Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:6-16 [Conf]
  3. Ivan Damgård
    On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:17-27 [Conf]
  4. Russell L. Brand
    Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:30-34 [Conf]
  5. John T. Kohl
    The use of Encryption in Kerberos for Network Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:35-43 [Conf]
  6. David C. Feldmeier, Philip R. Karn
    UNIX Password Security - Ten Years Later. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:44-63 [Conf]
  7. Jonathan M. Smith
    Practical Problems with a Cryptographic Protection Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:64-73 [Conf]
  8. Paul Barrett, Raymund Eisele
    The Smart Siskette - A Universal User Token and Personal Crypto-Engine. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:74-79 [Conf]
  9. Agnes Hui Chan, Richard A. Games
    On the Quadratic Spans of Periodic Sequences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:82-89 [Conf]
  10. Cees J. A. Jansen, Dick E. Boekee
    The Shortest Feedback Shift Register That Can Generate A Given Sequence. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:90-99 [Conf]
  11. Ueli M. Maurer, James L. Massey
    Perfect Local Randomness in Pseudo-Random Sequences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:100-112 [Conf]
  12. Oded Goldreich, Hugo Krawczyk
    Sparse Pseudorandom Distributions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:113-127 [Conf]
  13. Moni Naor
    Bit Commitment Using Pseudo-Randomness. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:128-136 [Conf]
  14. Hugo Krawczyk
    How to Predict Congruential Generators. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:138-153 [Conf]
  15. Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle
    A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:154-163 [Conf]
  16. Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
    On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:164-174 [Conf]
  17. Amos Fiat
    Batch RSA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:175-185 [Conf]
  18. Andreas Bender, Guy Castagnoli
    On the Implementation of Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:186-192 [Conf]
  19. Mihir Bellare, Shafi Goldwasser
    New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:194-211 [Conf]
  20. David Chaum, Hans Van Antwerpen
    Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:212-216 [Conf]
  21. Ralph C. Merkle
    A Certified Digital Signature. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:218-238 [Conf]
  22. Claus-Peter Schnorr
    Efficient Identification and Signatures for Smart Cards. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:239-252 [Conf]
  23. Marijke De Soete, Jean-Jacques Quisquater, Klaus Vedder
    A Signature with Shared Verification Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:253-262 [Conf]
  24. Shimon Even, Oded Goldreich, Silvio Micali
    On-Line/Off-Line Digital Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:263-275 [Conf]
  25. Ernest F. Brickell, Daniel M. Davenport
    On the Classification of Idea Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:278-285 [Conf]
  26. Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang
    Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:286-298 [Conf]
  27. Benny Chor, Eyal Kushilevitz
    Secret Sharing Over Infinite Domains (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:299-306 [Conf]
  28. Yvo Desmedt, Yair Frankel
    Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:307-315 [Conf]
  29. Gerald C. Chick, Stafford E. Tavares
    Flexible Access Control with Master Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:316-322 [Conf]
  30. Makoto Tatebayashi, Natsume Matsuzaki, David B. Newman Jr.
    Key Distribution Protocol for Digital Mobile Communication Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:324-334 [Conf]
  31. Johannes Buchmann, Hugh C. Williams
    A Key Exchange System Based on Real Quadratic Fields. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:335-343 [Conf]
  32. Yacov Yacobi, Zahava Shmuely
    On Key Distribution Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:344-355 [Conf]
  33. Ruth Nelson, John Heimann
    SDNS Architecture and End-to-End Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:356-366 [Conf]
  34. Ernest F. Brickell
    A Survey of Hardware Implementation of RSA (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:368-370 [Conf]
  35. Paul A. Findlay, Brian A. Johnson
    Modular Exponentiation Using Recursive Sums of Residues. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:371-386 [Conf]
  36. Hikaru Morita
    A Fast Modular-multiplication Algorithm based on a Higher Radix. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:387-399 [Conf]
  37. Jurjen N. Bos, Matthijs J. Coster
    Addition Chain Heuristics. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:400-407 [Conf]
  38. Jean-Jacques Quisquater, Jean-Paul Delescaille
    How Easy is Collision Search. New Results and Applications to DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:408-413 [Conf]
  39. Ivan Damgård
    A Design Principle for Hash Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:416-427 [Conf]
  40. Ralph C. Merkle
    One Way Hash Functions and DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:428-446 [Conf]
  41. Spyros S. Magliveras, Nasir D. Memon
    Properties of Cryptosystem PGM. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:447-460 [Conf]
  42. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:461-480 [Conf]
  43. Tatsuaki Okamoto, Kazuo Ohta
    Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:481-496 [Conf]
  44. Michael Ben-Or, Shafi Goldwasser, Joe Kilian, Avi Wigderson
    Efficient Identification Schemes Using Two Prover Interactive Proofs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:498-506 [Conf]
  45. Joan Boyar, René Peralta
    On the Concrete Complexity of Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:507-525 [Conf]
  46. Uriel Feige, Adi Shamir
    Zero Knowledge Proofs of Knowledge in Two Rounds. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:526-544 [Conf]
  47. Joe Kilian, Silvio Micali, Rafail Ostrovsky
    Minimum Resource Zero-Knowledge Proofs (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:545-546 [Conf]
  48. Mihir Bellare, Silvio Micali
    Non-Interactive Oblivious Transfer and Spplications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:547-557 [Conf]
  49. Donald Beaver
    Multiparty Protocols Tolerating Half Faulty Processors. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:560-572 [Conf]
  50. Richard Cleve
    Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:573-588 [Conf]
  51. Donald Beaver, Shafi Goldwasser
    Multiparty Computation with Faulty Majority. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:589-590 [Conf]
  52. David Chaum
    The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:591-602 [Conf]
  53. Mihir Bellare, Lenore Cowen, Shafi Goldwasser
    On the Structure of Secret Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:604-605 [Conf]
  54. Adi Shamir
    An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:606-609 [Conf]
  55. Rafail Ostrovsky
    An Efficient Software Protection Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:610-611 [Conf]
  56. Carlisle M. Adams, Stafford E. Tavares
    Good S-Boxes Are Easy To Find. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:612-615 [Conf]
  57. Steve R. White
    Covert Distributed Processing with Computer Viruses. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:616-619 [Conf]
  58. Wyn L. Price
    Progress in Data Security Standardization. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:620-623 [Conf]
  59. Shoji Miyaguchi
    The FEAL-8 Cryptosystem and a Call for Attack. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:624-627 [Conf]
  60. Jean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson
    How to Explain Zero-Knowledge Protocols to Your Children. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:628-631 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002