


default search action
7th CRYPTO 1987: Santa Barbara, California, USA
- Carl Pomerance:
Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings. Lecture Notes in Computer Science 293, Springer 1988, ISBN 3-540-18796-0
Communication Networks and Standards
- Wyn L. Price:
Standards for Data Security - A Change of Direction. 3-8 - Kåre Presttun:
Integrating Cryptography in ISDN. 9-18
Protocols
- Yvo Desmedt, Claude Goutier, Samy Bengio:
Special Uses and Abuses of the Fiat-Shamir Passport Protocol. 21-39 - Russell Impagliazzo
, Moti Yung:
Direct Minimum-Knowledge Computations. 40-51 - Alfredo De Santis
, Silvio Micali, Giuseppe Persiano:
Non-Interactive Zero-Knowledge Proof Systems. 52-72 - Oded Goldreich, Ronen Vainish:
How to Solve any Protocol Problem - An Efficiency Improvement. 73-86 - David Chaum, Ivan Damgård, Jeroen van de Graaf:
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. 87-119 - Yvo Desmedt:
Society and Group Oriented Cryptography: A New Concept. 120-127 - Jeroen van de Graaf, René Peralta
:
A Simple and Secure Way to Show the Validity of Your Public Key. 128-134 - Zvi Galil, Stuart Haber, Moti Yung:
Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model. 135-155 - Ernest F. Brickell, David Chaum, Ivan Damgård, Jeroen van de Graaf:
Gradual and Verifiable Release of a Secret. 156-166 - Judy H. Moore:
Strong Practical Protocols. 167-172
Key Distribution Systems
- Kenji Koyama, Kazuo Ohta:
Identity-based Conference Key Distribution Systems. 175-184 - Tsutomu Matsumoto, Hideki Imai:
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. 185-193 - Eiji Okamoto:
Key Distribution Systems Based on Identification Information. 194-202 - Jean-Jacques Quisquater:
Secret Distribution of Keys for Public-Key Systems. 203-208
Public Key Systems
- Gustavus J. Simmons:
An Impersonation-Proof Identity Verfication Scheme. 211-215 - George I. Davida, Brian J. Matt:
Arbitration in Tamper Proof Systems. 216-222 - Louis C. Guillou, Jean-Jacques Quisquater:
Efficient Digital Public-Key Signature with Shadow (Abstract). 223 - Carlisle M. Adams, Henk Meijer:
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. 224-228
Design and Analysis of Cryptographic Systems
- John M. DeLaurentis:
Components and Cycles of a Random Function. 231-242 - Frank A. Feldman:
Fast Spectral Tests for Measuring Nonrandomness and the DES. 243-254 - Jean-Jacques Quisquater, Jean-Paul Delescaille:
Other Cycling Tests for DES (Abstract). 255-256 - George I. Davida, Frank B. Dancs:
A Crypto-Engine. 257-268 - Gustavus J. Simmons:
A Natural Taxonomy for Digital Information Authentication Schemes. 269-288 - Richard A. Kemmerer:
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. 289-305 - G. R. Blakley, William Rundell:
Cryptosystems Based on an Analog of Heat Flow. 306-329 - Douglas R. Stinson, Scott A. Vanstone:
A Combinatorial Approach to Threshold Schemes. 330-339 - Hatsukazu Tanaka:
A Realization Scheme for the Identity-Based Cryptosystem. 340-349 - Claude Crépeau:
Equivalence Between Two Flavours of Oblivious Transfers. 350-354 - Douglas R. Stinson:
A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs. 355-366
Applications
- Ralph C. Merkle:
A Digital Signature Based on a Conventional Encryption Function. 369-378 - Maurice Herlihy, J. D. Tygar:
How to Make Replicated Data Secure. 379-391 - Michael Luby, Charles Rackoff:
A Study of Password Security. 392-397 - Yossi Matias, Adi Shamir:
A Video Scrambling Technique Based On Space Filling Curves. 398-417 - Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi:
Secure Audio Teleconference. 418-426
Informal Contributions
- Yacov Yacobi:
Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme. 429-433 - Walter Fumy:
On the F-function of FEAL. 434-437 - Kencheng Zeng, Jun-Hui Yang, Z. T. Dai:
Patterns of Entropy Drop of the Key in an S-Box of the DES. 438-444 - René Struik, Johan van Tilburg:
The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack. 445-457 - T. R. N. Rao:
On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme. 458-460 - Pierre Beauchemin, Gilles Brassard:
A Generalization of Hellman's Extension of Shannon's Approach to Cryptography (Abstract). 461 - David Chaum, Claude Crépeau, Ivan Damgård:
Multiparty Unconditionally Secure Protocols (Abstract). 462

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.