


default search action
8th CRYPTO 1988: Santa Barbara, California, USA
- Shafi Goldwasser:

Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings. Lecture Notes in Computer Science 403, Springer 1990, ISBN 3-540-97196-3
Cryptographic Primitives
- Claude Crépeau, Joe Kilian:

Weakening Security Assumptions and Oblivious Transfer (Abstract). 2-7 - Russell Impagliazzo

, Steven Rudich:
Limits on the Provable Consequences of One-way Permutations. 8-26 - Josh Cohen Benaloh, Jerry Leichter:

Generalized Secret Sharing and Monotone Functions. 27-35
Zero-Knowledge
- Michael Ben-Or

, Oded Goldreich, Shafi Goldwasser, Johan Håstad, Joe Kilian, Silvio Micali, Phillip Rogaway:
Everything Provable is Provable in Zero-Knowledge. 37-56 - Oded Goldreich, Eyal Kushilevitz:

A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm. 57-70 - Cynthia Dwork, Larry J. Stockmeyer:

Zero-Knowledge With Finite State Verifiers. 71-75
Number Theory
- Eric Bach:

Intractable Problems in Number Theory. 77-93 - Neal Koblitz:

A Family of Jacobians Suitable for Discrete Log Cryptosystems. 94-99 - Marc Girault, Philippe Toffin, Brigitte Vallée:

Computation of Approximate L-th Roots Modulo n and Application to Cryptography. 100-117
Cryptanalysis
- Johan van Tilburg:

On the McEliece Public-Key Cryptosystem. 119-131 - Michael Lucks:

A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers. 132-144
Pseudorandomness
- Oded Goldreich, Hugo Krawczyk, Michael Luby:

On the Existence of Pseudorandom Generators. 146-162 - Ivan Damgård:

On the Randomness of Legendre and Jacobi Sequences. 163-172 - Silvio Micali, Claus-Peter Schnorr:

Efficient, Perfect Random Number Generators. 173-198
Signatures and Authentication
- Mihir Bellare, Silvio Micali:

How To Sign Given Any Trapdoor Function. 200-215 - Louis C. Guillou, Jean-Jacques Quisquater:

A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. 216-231 - Kazuo Ohta, Tatsuaki Okamoto:

A Modification of the Fiat-Shamir Scheme. 232-243 - Silvio Micali, Adi Shamir:

An Improvement of the Fiat-Shamir Identification and Signature Scheme. 244-247
On the Theory of Security I
- Charles Rackoff:

A Basic Theory of Public and Private Cryptosystems. 249-255 - Manuel Blum, Paul Feldman, Silvio Micali:

Proving Security Against Chosen Cyphertext Attacks. 256-268 - Alfredo De Santis

, Silvio Micali, Giuseppe Persiano:
Non-Interactive Zero-Knowledge with Preprocessing. 269-282
On the Theory of Security II
- Uriel Feige, Adi Shamir, Moshe Tennenholtz:

The Noisy Oracle Problem. 284-296 - Martín Abadi, Eric Allender

, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra
:
On Generating Solved Instances of Computational Problems. 297-310 - Marijke De Soete:

Bounds and Constructions for Authentication-Secrecy Codes with Splitting. 311-317
Protocols
- David Chaum, Amos Fiat, Moni Naor:

Untraceable Electronic Cash. 319-327 - Ivan Damgård:

Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. 328-335 - Ming-Deh A. Huang, Shang-Hua Teng:

A Universal Problem in Secure and Verifiable Distributed Computation. 336-352
Security Concerns
- Leonard M. Adleman:

An Abstract Theory of Computer Viruses. 354-374 - Yvo Desmedt:

Abuses in Cryptography and How to Fight Them. 375-389 - Gustavus J. Simmons:

How to (Really) Share a Secret. 390-448
Linear Complexity
- Réjane Forré:

The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition. 450-468 - Kencheng Zeng, Minqiang Huang:

On the Linear Syndrome Method in Cryptanalysis. 469-478 - Richard T. C. Kwok, Maurice Beale:

Aperiodic Linear Complexities of de Bruijn Sequences. 479-482
Systems
- J. R. Sherwood, V. A. Gallo:

The Application of Smart Cards for RSA Digital Signatures in a Network Comprising both Interactive and Store-and-Foreward Facilities. 484-496 - Tsutomu Matsumoto, Koki Kato, Hideki Imai:

Speeding Up Secret Computations with Insecure Auxiliary Devices. 497-506 - B. J. Herbison:

Developing Ethernet Enhanced-Security System. 507-519 - David G. Steer, Leo Strawczynski, Whitfield Diffie, Michael J. Wiener:

A Secure Audio Teleconference System. 520-528
Short Rump Session Presentations
- Bert den Boer:

Diffie-Hellman is as Strong as Discrete Log for Certain Primes. 530-539 - Tzonelih Hwang, T. R. N. Rao:

Secret Error-Correcting Codes (SECC). 540-563 - Ernest F. Brickell, Douglas R. Stinson:

The Detection of Cheaters in Threshold Schemes. 564-577 - Stuart A. Kurtz, Stephen R. Mahaney, James S. Royer:

On the Power of 1-way Functions (Abstract). 578-579 - Gilles Brassard, Ivan Damgård:

"Practical IP" <= MA. 580-582 - Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen:

Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract). 583-588

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














