Advances in Cryptology — EUROCRYPT ’88
暂无分享,去创建一个
Niklaus Wirth | W. Brauer | C. Moler | D. Barstow | P. Brinch Hansen | D. Gries | D. Luckham | A. Pnueli | G. Seegmüller | J. Stoer | Christoph G. Günther | J. Stoer | C. Moler | A. Pnueli | D. Barstow | N. Wirth | D. Gries | P. B. Hansen | C. Günther | W. Brauer | G. Seegmüller | D. Luckham
[1] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[2] Manuel Blum,et al. Coin Flipping by Telephone. , 1981, CRYPTO 1981.
[3] Michel Loève,et al. Probability Theory I , 1977 .
[4] Gustavus J. Simmons,et al. Verification of Treaty Compliance -- Revisited , 1983, 1983 IEEE Symposium on Security and Privacy.
[5] Gustavus J. Simmons,et al. A Secure Subliminal Channel (?) , 1985, CRYPTO.
[6] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[7] Hugh C. Williams,et al. A modification of the RSA public-key encryption procedure (Corresp.) , 1980, IEEE Trans. Inf. Theory.
[8] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[9] Gustavus J. Simmons,et al. A System for Verifying User Identity and Authorization at the Point-of Sale or Access , 1984, Cryptologia.
[10] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[11] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[12] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[13] I. Good,et al. Ergodic theory and information , 1966 .