


default search action
9th CRYPTO 1989: Santa Barbara, California, USA
- Gilles Brassard:

Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings. Lecture Notes in Computer Science 435, Springer 1990, ISBN 3-540-97317-6
Opening Session
- David Kahn:

Keying the German Navy's Enigma. 2-5 - Yvo Desmedt:

Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. 6-16 - Ivan Damgård:

On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs. 17-27
Why is Cryptography Harder Than It Looks?
- Russell L. Brand:

Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks. 30-34 - John T. Kohl:

The use of Encryption in Kerberos for Network Authentication. 35-43 - David C. Feldmeier, Philip R. Karn:

UNIX Password Security - Ten Years Later. 44-63 - Jonathan M. Smith:

Practical Problems with a Cryptographic Protection Scheme. 64-73 - Paul Barrett, Raymund Eisele:

The Smart Siskette - A Universal User Token and Personal Crypto-Engine. 74-79
Pseudo-randomness and Sequences
- Agnes Hui Chan, Richard A. Games:

On the Quadratic Spans of Periodic Sequences. 82-89 - Cees J. A. Jansen, Dick E. Boekee:

The Shortest Feedback Shift Register That Can Generate A Given Sequence. 90-99 - Ueli M. Maurer, James L. Massey:

Perfect Local Randomness in Pseudo-Random Sequences. 100-112 - Oded Goldreich, Hugo Krawczyk:

Sparse Pseudorandom Distributions. 113-127 - Moni Naor:

Bit Commitment Using Pseudo-Randomness. 128-136
Cryptanalysis and Implementation
- Hugo Krawczyk:

How to Predict Congruential Generators. 138-153 - Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle:

A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. 154-163 - Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao:

On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. 164-174 - Amos Fiat:

Batch RSA. 175-185 - Andreas Bender, Guy Castagnoli:

On the Implementation of Elliptic Curve Cryptosystems. 186-192
Signature and Authentication I
- Mihir Bellare, Shafi Goldwasser:

New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs. 194-211 - David Chaum, Hans Van Antwerpen:

Undeniable Signatures. 212-216
Signature and Authentication II
- Ralph C. Merkle:

A Certified Digital Signature. 218-238 - Claus-Peter Schnorr:

Efficient Identification and Signatures for Smart Cards. 239-252 - Marijke De Soete, Jean-Jacques Quisquater, Klaus Vedder:

A Signature with Shared Verification Scheme. 253-262 - Shimon Even, Oded Goldreich

, Silvio Micali:
On-Line/Off-Line Digital Schemes. 263-275
Threshold Schemes and Key Management
- Ernest F. Brickell, Daniel M. Davenport:

On the Classification of Idea Secret Sharing Schemes. 278-285 - Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang:

Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. 286-298 - Benny Chor, Eyal Kushilevitz:

Secret Sharing Over Infinite Domains (Extended Abstract). 299-306 - Yvo Desmedt, Yair Frankel:

Threshold Cryptosystems. 307-315 - Gerald C. Chick, Stafford E. Tavares:

Flexible Access Control with Master Keys. 316-322
Key Distribution and Network Security
- Makoto Tatebayashi, Natsume Matsuzaki, David B. Newman Jr.:

Key Distribution Protocol for Digital Mobile Communication Systems. 324-334 - Johannes Buchmann, Hugh C. Williams:

A Key Exchange System Based on Real Quadratic Fields. 335-343 - Yacov Yacobi, Zahava Shmuely:

On Key Distribution Systems. 344-355 - Ruth Nelson, John H. Heimann:

SDNS Architecture and End-to-End Encryption. 356-366
Fast Computation
- Ernest F. Brickell:

A Survey of Hardware Implementation of RSA (Abstract). 368-370 - Paul A. Findlay, Brian A. Johnson:

Modular Exponentiation Using Recursive Sums of Residues. 371-386 - Hikaru Morita:

A Fast Modular-multiplication Algorithm based on a Higher Radix. 387-399 - Jurjen N. Bos, Matthijs J. Coster:

Addition Chain Heuristics. 400-407 - Jean-Jacques Quisquater, Jean-Paul Delescaille:

How Easy is Collision Search. New Results and Applications to DES. 408-413
Odds and Ends
- Ivan Damgård:

A Design Principle for Hash Functions. 416-427 - Ralph C. Merkle:

One Way Hash Functions and DES. 428-446 - Spyros S. Magliveras, Nasir D. Memon

:
Properties of Cryptosystem PGM. 447-460 - Yuliang Zheng

, Tsutomu Matsumoto, Hideki Imai:
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. 461-480 - Tatsuaki Okamoto, Kazuo Ohta:

Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. 481-496
Zero-Knowledge and Oblivious Transfer
- Michael Ben-Or

, Shafi Goldwasser, Joe Kilian, Avi Wigderson:
Efficient Identification Schemes Using Two Prover Interactive Proofs. 498-506 - Joan Boyar, René Peralta

:
On the Concrete Complexity of Zero-Knowledge Proofs. 507-525 - Uriel Feige, Adi Shamir:

Zero Knowledge Proofs of Knowledge in Two Rounds. 526-544 - Joe Kilian, Silvio Micali, Rafail Ostrovsky:

Minimum Resource Zero-Knowledge Proofs (Extended Abstract). 545-546 - Mihir Bellare, Silvio Micali:

Non-Interactive Oblivious Transfer and Applications. 547-557
Multiparty Computation
- Donald Beaver:

Multiparty Protocols Tolerating Half Faulty Processors. 560-572 - Richard Cleve:

Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. 573-588 - Donald Beaver, Shafi Goldwasser:

Multiparty Computation with Faulty Majority. 589-590 - David Chaum:

The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities. 591-602
Rump Session: Impromptu Talks
- Mihir Bellare, Lenore Cowen, Shafi Goldwasser:

On the Structure of Secret Key Exchange Protocols. 604-605 - Adi Shamir:

An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract). 606-609 - Rafail Ostrovsky:

An Efficient Software Protection Scheme. 610-611 - Carlisle M. Adams, Stafford E. Tavares:

Good S-Boxes Are Easy To Find. 612-615 - Steve R. White:

Covert Distributed Processing with Computer Viruses. 616-619 - Wyn L. Price:

Progress in Data Security Standardization. 620-623 - Shoji Miyaguchi:

The FEAL-8 Cryptosystem and a Call for Attack. 624-627 - Jean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson:

How to Explain Zero-Knowledge Protocols to Your Children. 628-631

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














