Advances in Cryptology — CRYPTO’ 89 Proceedings
暂无分享,去创建一个
[1] Silvio Micali,et al. How To Sign Given Any Trapdoor Function , 1988, CRYPTO.
[2] G. R. Blakley,et al. Security Proofs for Information Protection Systems , 1981, 1981 IEEE Symposium on Security and Privacy.
[3] David S. Johnson,et al. Some Simplified NP-Complete Graph Problems , 1976, Theor. Comput. Sci..
[4] Amos Fiat,et al. Zero-knowledge proofs of identity , 1988, Journal of Cryptology.
[5] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[6] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[7] Jan van Leeuwen. An extension of Hansen's theorem for star chains. , 1977 .
[8] Oded Goldreich,et al. Cryptography and Computer Security , 2003 .
[9] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[10] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[11] Hugh C. Williams,et al. A modification of the RSA public-key encryption procedure (Corresp.) , 1980, IEEE Trans. Inf. Theory.
[12] Edwin Weiss,et al. A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.
[13] Claus-Peter Schnorr,et al. On the Construction of Random Number Generators and Random Function Generators , 1988, EUROCRYPT.
[14] Gustavus J. Simmons,et al. How to (Really) Share a Secret , 1988, CRYPTO.
[15] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[16] David Chaum,et al. Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result , 1987, CRYPTO.
[17] Adi Shamir,et al. On Digital Signatures and Public-Key Cryptosystems. , 1977 .
[18] E. Shult,et al. Permutation Groups with Few Fixed Points , 1981 .
[19] I-Ngo Chen,et al. An algorithm for modular exponentiation , 1981, 1981 IEEE 5th Symposium on Computer Arithmetic (ARITH).
[20] Michael J. Fischer,et al. Relations Among Complexity Measures , 1979, JACM.
[21] Moni Naor,et al. Bit Commitment Using Pseudo-Randomness , 1989, CRYPTO.
[22] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[23] P. Cameron. FINITE PERMUTATION GROUPS AND FINITE SIMPLE GROUPS , 1981 .
[24] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[25] Carl H. Meyer,et al. Ciphertext/plaintext and ciphertext/key dependence vs. number of rounds for the data encryption standard , 1899, AFIPS National Computer Conference.
[26] Moti Yung,et al. Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds , 1989, ICALP.
[27] David Chaum,et al. An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations , 1987, EUROCRYPT.
[28] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[29] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[30] Richard M. Karp,et al. On the Security of Ping-Pong Protocols , 1982, Information and Control.
[31] Marvin C. Wunderlich,et al. On the parallel generation of the residues for the continued fraction factoring algorithm , 1987 .
[32] Peter J. Downey,et al. Computing Sequences with Addition Chains , 1981, SIAM J. Comput..
[33] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[34] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[35] Chris J. Mitchell,et al. Algorithms for software implementations of RSA , 1989 .
[36] Henri Cohen,et al. Heuristics on class groups of number fields , 1984 .
[37] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[38] Silvio Micali,et al. Non-Interactive Zero-Knowledge Proof Systems , 1987, CRYPTO.
[39] Josh Benaloh,et al. Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols , 1986, CRYPTO.
[40] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[41] Y. H. Chin,et al. A study of some addition chain problems , 1987 .
[42] John E. Hopcroft,et al. Polynomial-time algorithms for permutation groups , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).
[43] Edward G. Thurber. Addition chains and solutions of l(2n) = l(n) and l(2n - 1) = n + l(n) - 1 , 1976, Discret. Math..
[44] Neal Koblitz,et al. a course in number theory , 1987 .
[45] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[46] A. J. Surkan,et al. A new random number generator from permutation groups , 1985 .
[47] P. W. Baker. Fast computation of A * B modulo N , 1987 .
[48] Fred B. Schneider,et al. Master Keys for Group Sharing , 1981, Inf. Process. Lett..
[49] David Chaum,et al. Attacks on Some RSA Signatures , 1985, CRYPTO.
[50] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[51] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[52] Leonid A. Levin,et al. One-way functions and pseudorandom generators , 1985, STOC '85.
[53] G. R. Blakley,et al. A Computer Algorithm for Calculating the Product AB Modulo M , 1983, IEEE Trans. Computers.
[54] Jeffrey C. Lagarias,et al. Solving low density subset sum problems , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[55] Andrew Chi-Chih Yao,et al. On the Evaluation of Powers , 1976, SIAM J. Comput..
[56] Oded Goldreich,et al. Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme , 1986, CRYPTO.
[57] Srecko Brlek,et al. Addition Chains Using Continued Fractions , 1989, J. Algorithms.
[58] Stephen A. Cook,et al. The complexity of theorem-proving procedures , 1971, STOC.
[59] V. Thomas Rhyne,et al. A Canonical Bit-Sequential Multiplier , 1982, IEEE Transactions on Computers.
[60] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[61] Douglas R. Stinson,et al. A Combinatorial Approach to Threshold Schemes , 1987, CRYPTO.
[62] Manuel Blum,et al. Designing programs that check their work , 1989, STOC '89.
[63] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[64] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[65] Stuart A. Kurtz,et al. A discrete logarithm implementation of zero-knowledge blobs , 1987 .
[66] Adi Shamir,et al. How to share a secret , 1979, CACM.
[67] Martín Abadi,et al. On hiding information from an oracle , 1987, STOC '87.
[68] Alan T. Sherman,et al. Is the data encryption standard a group , 1986 .
[69] Emanuel Vegh,et al. A Note on Addition Chains , 1975, Journal of combinatorial theory. Series A.
[70] Yair Frankel,et al. A Practical Protocol for Large Group Oriented Networks , 1990, EUROCRYPT.
[71] Avi Wigderson,et al. Multi-prover interactive proofs: how to remove intractability assumptions , 2019, STOC '88.
[72] Richard J. Lipton,et al. Addition Chain Methods for the Evaluation of Specific Polynomials , 1980, SIAM J. Comput..
[73] Gustavus J. Simmons,et al. A Natural Taxonomy for Digital Information Authentication Schemes , 1987, CRYPTO.
[74] Stanley E. Payne. Generalized Quadrangles of Even Order , 1974 .
[75] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.