Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/crypto/crypto88.bht:"
@proceedings{DBLP:conf/crypto/1988, editor = {Shafi Goldwasser}, title = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/0-387-34799-2}, doi = {10.1007/0-387-34799-2}, isbn = {3-540-97196-3}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/1988.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbadiABFH88, author = {Mart{\'{\i}}n Abadi and Eric Allender and Andrei Z. Broder and Joan Feigenbaum and Lane A. Hemachandra}, editor = {Shafi Goldwasser}, title = {On Generating Solved Instances of Computational Problems}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {297--310}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_23}, doi = {10.1007/0-387-34799-2\_23}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbadiABFH88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Adleman88, author = {Leonard M. Adleman}, editor = {Shafi Goldwasser}, title = {An Abstract Theory of Computer Viruses}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {354--374}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_28}, doi = {10.1007/0-387-34799-2\_28}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Adleman88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Bach88, author = {Eric Bach}, editor = {Shafi Goldwasser}, title = {Intractable Problems in Number Theory}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {77--93}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_7}, doi = {10.1007/0-387-34799-2\_7}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Bach88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareM88, author = {Mihir Bellare and Silvio Micali}, editor = {Shafi Goldwasser}, title = {How To Sign Given Any Trapdoor Function}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {200--215}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_15}, doi = {10.1007/0-387-34799-2\_15}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-OrGGHKMR88, author = {Michael Ben{-}Or and Oded Goldreich and Shafi Goldwasser and Johan H{\aa}stad and Joe Kilian and Silvio Micali and Phillip Rogaway}, editor = {Shafi Goldwasser}, title = {Everything Provable is Provable in Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {37--56}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_4}, doi = {10.1007/0-387-34799-2\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-OrGGHKMR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlumFM88, author = {Manuel Blum and Paul Feldman and Silvio Micali}, editor = {Shafi Goldwasser}, title = {Proving Security Against Chosen Cyphertext Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {256--268}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_20}, doi = {10.1007/0-387-34799-2\_20}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlumFM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Boer88, author = {Bert den Boer}, editor = {Shafi Goldwasser}, title = {Diffie-Hellman is as Strong as Discrete Log for Certain Primes}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {530--539}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_38}, doi = {10.1007/0-387-34799-2\_38}, timestamp = {Wed, 12 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Boer88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrandtDLP88, author = {J{\o}rgen Brandt and Ivan Damg{\aa}rd and Peter Landrock and Torben P. Pedersen}, editor = {Shafi Goldwasser}, title = {Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {583--588}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_43}, doi = {10.1007/0-387-34799-2\_43}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrandtDLP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrassardD88, author = {Gilles Brassard and Ivan Damg{\aa}rd}, editor = {Shafi Goldwasser}, title = {"Practical IP" {\textless}= {MA}}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {580--582}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_42}, doi = {10.1007/0-387-34799-2\_42}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrassardD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrickellS88, author = {Ernest F. Brickell and Douglas R. Stinson}, editor = {Shafi Goldwasser}, title = {The Detection of Cheaters in Threshold Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {564--577}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_40}, doi = {10.1007/0-387-34799-2\_40}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrickellS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumFN88, author = {David Chaum and Amos Fiat and Moni Naor}, editor = {Shafi Goldwasser}, title = {Untraceable Electronic Cash}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {319--327}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_25}, doi = {10.1007/0-387-34799-2\_25}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumFN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CrepeauK88, author = {Claude Cr{\'{e}}peau and Joe Kilian}, editor = {Shafi Goldwasser}, title = {Weakening Security Assumptions and Oblivious Transfer (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {2--7}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_1}, doi = {10.1007/0-387-34799-2\_1}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CrepeauK88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Damgard88, author = {Ivan Damg{\aa}rd}, editor = {Shafi Goldwasser}, title = {On the Randomness of Legendre and Jacobi Sequences}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {163--172}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_13}, doi = {10.1007/0-387-34799-2\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Damgard88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Damgard88a, author = {Ivan Damg{\aa}rd}, editor = {Shafi Goldwasser}, title = {Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {328--335}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_26}, doi = {10.1007/0-387-34799-2\_26}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Damgard88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Desmedt88, author = {Yvo Desmedt}, editor = {Shafi Goldwasser}, title = {Abuses in Cryptography and How to Fight Them}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {375--389}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_29}, doi = {10.1007/0-387-34799-2\_29}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Desmedt88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DworkS88, author = {Cynthia Dwork and Larry J. Stockmeyer}, editor = {Shafi Goldwasser}, title = {Zero-Knowledge With Finite State Verifiers}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {71--75}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_6}, doi = {10.1007/0-387-34799-2\_6}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DworkS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FeigeST88, author = {Uriel Feige and Adi Shamir and Moshe Tennenholtz}, editor = {Shafi Goldwasser}, title = {The Noisy Oracle Problem}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {284--296}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_22}, doi = {10.1007/0-387-34799-2\_22}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FeigeST88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Forre88, author = {R{\'{e}}jane Forr{\'{e}}}, editor = {Shafi Goldwasser}, title = {The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {450--468}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_31}, doi = {10.1007/0-387-34799-2\_31}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Forre88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GiraultTV88, author = {Marc Girault and Philippe Toffin and Brigitte Vall{\'{e}}e}, editor = {Shafi Goldwasser}, title = {Computation of Approximate L-th Roots Modulo \emph{n} and Application to Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {100--117}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_9}, doi = {10.1007/0-387-34799-2\_9}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GiraultTV88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldreichK88, author = {Oded Goldreich and Eyal Kushilevitz}, editor = {Shafi Goldwasser}, title = {A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {57--70}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_5}, doi = {10.1007/0-387-34799-2\_5}, timestamp = {Wed, 15 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoldreichK88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldreichKL88, author = {Oded Goldreich and Hugo Krawczyk and Michael Luby}, editor = {Shafi Goldwasser}, title = {On the Existence of Pseudorandom Generators}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {146--162}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_12}, doi = {10.1007/0-387-34799-2\_12}, timestamp = {Wed, 15 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoldreichKL88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuillouQ88, author = {Louis C. Guillou and Jean{-}Jacques Quisquater}, editor = {Shafi Goldwasser}, title = {A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {216--231}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_16}, doi = {10.1007/0-387-34799-2\_16}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuillouQ88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Herbison88, author = {B. J. Herbison}, editor = {Shafi Goldwasser}, title = {Developing Ethernet Enhanced-Security System}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {507--519}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_36}, doi = {10.1007/0-387-34799-2\_36}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Herbison88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HuangT88, author = {Ming{-}Deh A. Huang and Shang{-}Hua Teng}, editor = {Shafi Goldwasser}, title = {A Universal Problem in Secure and Verifiable Distributed Computation}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {336--352}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_27}, doi = {10.1007/0-387-34799-2\_27}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HuangT88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HwangR88, author = {Tzonelih Hwang and T. R. N. Rao}, editor = {Shafi Goldwasser}, title = {Secret Error-Correcting Codes {(SECC)}}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {540--563}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_39}, doi = {10.1007/0-387-34799-2\_39}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HwangR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ImpagliazzoR88, author = {Russell Impagliazzo and Steven Rudich}, editor = {Shafi Goldwasser}, title = {Limits on the Provable Consequences of One-way Permutations}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {8--26}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_2}, doi = {10.1007/0-387-34799-2\_2}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ImpagliazzoR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Koblitz88, author = {Neal Koblitz}, editor = {Shafi Goldwasser}, title = {A Family of Jacobians Suitable for Discrete Log Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {94--99}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_8}, doi = {10.1007/0-387-34799-2\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Koblitz88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KurtzMR88, author = {Stuart A. Kurtz and Stephen R. Mahaney and James S. Royer}, editor = {Shafi Goldwasser}, title = {On the Power of 1-way Functions (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {578--579}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_41}, doi = {10.1007/0-387-34799-2\_41}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KurtzMR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KwokB88, author = {Richard T. C. Kwok and Maurice Beale}, editor = {Shafi Goldwasser}, title = {Aperiodic Linear Complexities of de Bruijn Sequences}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {479--482}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_33}, doi = {10.1007/0-387-34799-2\_33}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KwokB88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Leichter88, author = {Josh Cohen Benaloh and Jerry Leichter}, editor = {Shafi Goldwasser}, title = {Generalized Secret Sharing and Monotone Functions}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {27--35}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_3}, doi = {10.1007/0-387-34799-2\_3}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Leichter88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Lucks88, author = {Michael Lucks}, editor = {Shafi Goldwasser}, title = {A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {132--144}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_11}, doi = {10.1007/0-387-34799-2\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Lucks88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MatsumotoKI88, author = {Tsutomu Matsumoto and Koki Kato and Hideki Imai}, editor = {Shafi Goldwasser}, title = {Speeding Up Secret Computations with Insecure Auxiliary Devices}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {497--506}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_35}, doi = {10.1007/0-387-34799-2\_35}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MatsumotoKI88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MicaliS88, author = {Silvio Micali and Claus{-}Peter Schnorr}, editor = {Shafi Goldwasser}, title = {Efficient, Perfect Random Number Generators}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {173--198}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_14}, doi = {10.1007/0-387-34799-2\_14}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MicaliS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MicaliS88a, author = {Silvio Micali and Adi Shamir}, editor = {Shafi Goldwasser}, title = {An Improvement of the Fiat-Shamir Identification and Signature Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {244--247}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_18}, doi = {10.1007/0-387-34799-2\_18}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MicaliS88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OhtaO88, author = {Kazuo Ohta and Tatsuaki Okamoto}, editor = {Shafi Goldwasser}, title = {A Modification of the Fiat-Shamir Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {232--243}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_17}, doi = {10.1007/0-387-34799-2\_17}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OhtaO88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Rackoff88, author = {Charles Rackoff}, editor = {Shafi Goldwasser}, title = {A Basic Theory of Public and Private Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {249--255}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_19}, doi = {10.1007/0-387-34799-2\_19}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Rackoff88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SantisMP88, author = {Alfredo De Santis and Silvio Micali and Giuseppe Persiano}, editor = {Shafi Goldwasser}, title = {Non-Interactive Zero-Knowledge with Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {269--282}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_21}, doi = {10.1007/0-387-34799-2\_21}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SantisMP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SherwoodG88, author = {J. R. Sherwood and V. A. Gallo}, editor = {Shafi Goldwasser}, title = {The Application of Smart Cards for {RSA} Digital Signatures in a Network Comprising both Interactive and Store-and-Foreward Facilities}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {484--496}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_34}, doi = {10.1007/0-387-34799-2\_34}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SherwoodG88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Simmons88, author = {Gustavus J. Simmons}, editor = {Shafi Goldwasser}, title = {How to (Really) Share a Secret}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {390--448}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_30}, doi = {10.1007/0-387-34799-2\_30}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Simmons88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Soete88, author = {Marijke De Soete}, editor = {Shafi Goldwasser}, title = {Bounds and Constructions for Authentication-Secrecy Codes with Splitting}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {311--317}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_24}, doi = {10.1007/0-387-34799-2\_24}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Soete88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SteerSDW88, author = {David G. Steer and Leo Strawczynski and Whitfield Diffie and Michael J. Wiener}, editor = {Shafi Goldwasser}, title = {A Secure Audio Teleconference System}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {520--528}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_37}, doi = {10.1007/0-387-34799-2\_37}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SteerSDW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Tilburg88, author = {Johan van Tilburg}, editor = {Shafi Goldwasser}, title = {On the McEliece Public-Key Cryptosystem}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {119--131}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_10}, doi = {10.1007/0-387-34799-2\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Tilburg88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ZengH88, author = {Kencheng Zeng and Minqiang Huang}, editor = {Shafi Goldwasser}, title = {On the Linear Syndrome Method in Cryptanalysis}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {469--478}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_32}, doi = {10.1007/0-387-34799-2\_32}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ZengH88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.