default search action
Search dblp for Publications
export results for "toc:db/conf/crypto/crypto87.bht:"
@proceedings{DBLP:conf/crypto/1987, editor = {Carl Pomerance}, title = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-48184-2}, doi = {10.1007/3-540-48184-2}, isbn = {3-540-18796-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/1987.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AdamsM87, author = {Carlisle M. Adams and Henk Meijer}, editor = {Carl Pomerance}, title = {Security-Related Comments Regarding McEliece's Public-Key Cryptosystem}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {224--228}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_20}, doi = {10.1007/3-540-48184-2\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AdamsM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeaucheminB87, author = {Pierre Beauchemin and Gilles Brassard}, editor = {Carl Pomerance}, title = {A Generalization of Hellman's Extension of Shannon's Approach to Cryptography (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {461}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_42}, doi = {10.1007/3-540-48184-2\_42}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeaucheminB87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlakleyR87, author = {G. R. Blakley and William Rundell}, editor = {Carl Pomerance}, title = {Cryptosystems Based on an Analog of Heat Flow}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {306--329}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_27}, doi = {10.1007/3-540-48184-2\_27}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlakleyR87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrickellCDG87, author = {Ernest F. Brickell and David Chaum and Ivan Damg{\aa}rd and Jeroen van de Graaf}, editor = {Carl Pomerance}, title = {Gradual and Verifiable Release of a Secret}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {156--166}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_11}, doi = {10.1007/3-540-48184-2\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrickellCDG87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrickellLY87, author = {Ernest F. Brickell and Pil Joong Lee and Yacov Yacobi}, editor = {Carl Pomerance}, title = {Secure Audio Teleconference}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {418--426}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_36}, doi = {10.1007/3-540-48184-2\_36}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrickellLY87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumCD87, author = {David Chaum and Claude Cr{\'{e}}peau and Ivan Damg{\aa}rd}, editor = {Carl Pomerance}, title = {Multiparty Unconditionally Secure Protocols (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {462}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_43}, doi = {10.1007/3-540-48184-2\_43}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumCD87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumDG87, author = {David Chaum and Ivan Damg{\aa}rd and Jeroen van de Graaf}, editor = {Carl Pomerance}, title = {Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {87--119}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_7}, doi = {10.1007/3-540-48184-2\_7}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ChaumDG87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Crepeau87, author = {Claude Cr{\'{e}}peau}, editor = {Carl Pomerance}, title = {Equivalence Between Two Flavours of Oblivious Transfers}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {350--354}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_30}, doi = {10.1007/3-540-48184-2\_30}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Crepeau87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DavidaD87, author = {George I. Davida and Frank B. Dancs}, editor = {Carl Pomerance}, title = {A Crypto-Engine}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {257--268}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_24}, doi = {10.1007/3-540-48184-2\_24}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DavidaD87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DavidaM87, author = {George I. Davida and Brian J. Matt}, editor = {Carl Pomerance}, title = {Arbitration in Tamper Proof Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {216--222}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_18}, doi = {10.1007/3-540-48184-2\_18}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DavidaM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DeLaurentis87, author = {John M. DeLaurentis}, editor = {Carl Pomerance}, title = {Components and Cycles of a Random Function}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {231--242}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_21}, doi = {10.1007/3-540-48184-2\_21}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DeLaurentis87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Desmedt87, author = {Yvo Desmedt}, editor = {Carl Pomerance}, title = {Society and Group Oriented Cryptography: {A} New Concept}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {120--127}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_8}, doi = {10.1007/3-540-48184-2\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Desmedt87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtGB87, author = {Yvo Desmedt and Claude Goutier and Samy Bengio}, editor = {Carl Pomerance}, title = {Special Uses and Abuses of the Fiat-Shamir Passport Protocol}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {21--39}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_3}, doi = {10.1007/3-540-48184-2\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtGB87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Feldman87, author = {Frank A. Feldman}, editor = {Carl Pomerance}, title = {Fast Spectral Tests for Measuring Nonrandomness and the {DES}}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {243--254}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_22}, doi = {10.1007/3-540-48184-2\_22}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Feldman87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Fumy87, author = {Walter Fumy}, editor = {Carl Pomerance}, title = {On the F-function of {FEAL}}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {434--437}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_38}, doi = {10.1007/3-540-48184-2\_38}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Fumy87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GalilHY87, author = {Zvi Galil and Stuart Haber and Moti Yung}, editor = {Carl Pomerance}, title = {Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {135--155}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_10}, doi = {10.1007/3-540-48184-2\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GalilHY87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldreichV87, author = {Oded Goldreich and Ronen Vainish}, editor = {Carl Pomerance}, title = {How to Solve any Protocol Problem - An Efficiency Improvement}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {73--86}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_6}, doi = {10.1007/3-540-48184-2\_6}, timestamp = {Wed, 15 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoldreichV87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GraafP87, author = {Jeroen van de Graaf and Ren{\'{e}} Peralta}, editor = {Carl Pomerance}, title = {A Simple and Secure Way to Show the Validity of Your Public Key}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {128--134}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_9}, doi = {10.1007/3-540-48184-2\_9}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GraafP87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuillouQ87, author = {Louis C. Guillou and Jean{-}Jacques Quisquater}, editor = {Carl Pomerance}, title = {Efficient Digital Public-Key Signature with Shadow (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {223}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_19}, doi = {10.1007/3-540-48184-2\_19}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuillouQ87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HerlihyT87, author = {Maurice Herlihy and J. D. Tygar}, editor = {Carl Pomerance}, title = {How to Make Replicated Data Secure}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {379--391}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_33}, doi = {10.1007/3-540-48184-2\_33}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HerlihyT87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ImpagliazzoY87, author = {Russell Impagliazzo and Moti Yung}, editor = {Carl Pomerance}, title = {Direct Minimum-Knowledge Computations}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {40--51}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_4}, doi = {10.1007/3-540-48184-2\_4}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ImpagliazzoY87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kemmerer87, author = {Richard A. Kemmerer}, editor = {Carl Pomerance}, title = {Analyzing Encryption Protocols Using Formal Verification Authentication Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {289--305}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_26}, doi = {10.1007/3-540-48184-2\_26}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kemmerer87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KoyamaO87, author = {Kenji Koyama and Kazuo Ohta}, editor = {Carl Pomerance}, title = {Identity-based Conference Key Distribution Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {175--184}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_13}, doi = {10.1007/3-540-48184-2\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KoyamaO87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LubyR87, author = {Michael Luby and Charles Rackoff}, editor = {Carl Pomerance}, title = {A Study of Password Security}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {392--397}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_34}, doi = {10.1007/3-540-48184-2\_34}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LubyR87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MatiasS87, author = {Yossi Matias and Adi Shamir}, editor = {Carl Pomerance}, title = {A Video Scrambling Technique Based On Space Filling Curves}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {398--417}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_35}, doi = {10.1007/3-540-48184-2\_35}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MatiasS87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MatsumotoI87, author = {Tsutomu Matsumoto and Hideki Imai}, editor = {Carl Pomerance}, title = {On the Key Predistribution System: {A} Practical Solution to the Key Distribution Problem}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {185--193}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_14}, doi = {10.1007/3-540-48184-2\_14}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MatsumotoI87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Merkle87, author = {Ralph C. Merkle}, editor = {Carl Pomerance}, title = {A Digital Signature Based on a Conventional Encryption Function}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {369--378}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_32}, doi = {10.1007/3-540-48184-2\_32}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Merkle87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Moore87, author = {Judy H. Moore}, editor = {Carl Pomerance}, title = {Strong Practical Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {167--172}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_12}, doi = {10.1007/3-540-48184-2\_12}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Moore87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Okamoto87, author = {Eiji Okamoto}, editor = {Carl Pomerance}, title = {Key Distribution Systems Based on Identification Information}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {194--202}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_15}, doi = {10.1007/3-540-48184-2\_15}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Okamoto87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Presttun87, author = {K{\aa}re Presttun}, editor = {Carl Pomerance}, title = {Integrating Cryptography in {ISDN}}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {9--18}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_2}, doi = {10.1007/3-540-48184-2\_2}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Presttun87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Price87, author = {Wyn L. Price}, editor = {Carl Pomerance}, title = {Standards for Data Security - {A} Change of Direction}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {3--8}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_1}, doi = {10.1007/3-540-48184-2\_1}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Price87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Quisquater87, author = {Jean{-}Jacques Quisquater}, editor = {Carl Pomerance}, title = {Secret Distribution of Keys for Public-Key Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {203--208}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_16}, doi = {10.1007/3-540-48184-2\_16}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Quisquater87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuisquaterD87, author = {Jean{-}Jacques Quisquater and Jean{-}Paul Delescaille}, editor = {Carl Pomerance}, title = {Other Cycling Tests for {DES} (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {255--256}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_23}, doi = {10.1007/3-540-48184-2\_23}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/QuisquaterD87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Rao87, author = {T. R. N. Rao}, editor = {Carl Pomerance}, title = {On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {458--460}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_41}, doi = {10.1007/3-540-48184-2\_41}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Rao87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SantisMP87, author = {Alfredo De Santis and Silvio Micali and Giuseppe Persiano}, editor = {Carl Pomerance}, title = {Non-Interactive Zero-Knowledge Proof Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {52--72}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_5}, doi = {10.1007/3-540-48184-2\_5}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SantisMP87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Simmons87, author = {Gustavus J. Simmons}, editor = {Carl Pomerance}, title = {An Impersonation-Proof Identity Verfication Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {211--215}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_17}, doi = {10.1007/3-540-48184-2\_17}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Simmons87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Simmons87a, author = {Gustavus J. Simmons}, editor = {Carl Pomerance}, title = {A Natural Taxonomy for Digital Information Authentication Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {269--288}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_25}, doi = {10.1007/3-540-48184-2\_25}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Simmons87a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Stinson87, author = {Douglas R. Stinson}, editor = {Carl Pomerance}, title = {A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {355--366}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_31}, doi = {10.1007/3-540-48184-2\_31}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Stinson87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/StinsonV87, author = {Douglas R. Stinson and Scott A. Vanstone}, editor = {Carl Pomerance}, title = {A Combinatorial Approach to Threshold Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {330--339}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_28}, doi = {10.1007/3-540-48184-2\_28}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/StinsonV87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/StruikT87, author = {Ren{\'{e}} Struik and Johan van Tilburg}, editor = {Carl Pomerance}, title = {The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {445--457}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_40}, doi = {10.1007/3-540-48184-2\_40}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/StruikT87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Tanaka87, author = {Hatsukazu Tanaka}, editor = {Carl Pomerance}, title = {A Realization Scheme for the Identity-Based Cryptosystem}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {340--349}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_29}, doi = {10.1007/3-540-48184-2\_29}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Tanaka87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Yacobi87, author = {Yacov Yacobi}, editor = {Carl Pomerance}, title = {Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {429--433}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_37}, doi = {10.1007/3-540-48184-2\_37}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Yacobi87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ZengYD87, author = {Kencheng Zeng and Jun{-}Hui Yang and Z. T. Dai}, editor = {Carl Pomerance}, title = {Patterns of Entropy Drop of the Key in an S-Box of the {DES}}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {438--444}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_39}, doi = {10.1007/3-540-48184-2\_39}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ZengYD87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.