Search dblp for Publications

export results for "toc:db/conf/crypto/crypto88.bht:"

 download as .bib file

@proceedings{DBLP:conf/crypto/1988,
  editor       = {Shafi Goldwasser},
  title        = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/0-387-34799-2},
  doi          = {10.1007/0-387-34799-2},
  isbn         = {3-540-97196-3},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/1988.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbadiABFH88,
  author       = {Mart{\'{\i}}n Abadi and
                  Eric Allender and
                  Andrei Z. Broder and
                  Joan Feigenbaum and
                  Lane A. Hemachandra},
  editor       = {Shafi Goldwasser},
  title        = {On Generating Solved Instances of Computational Problems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {297--310},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_23},
  doi          = {10.1007/0-387-34799-2\_23},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbadiABFH88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Adleman88,
  author       = {Leonard M. Adleman},
  editor       = {Shafi Goldwasser},
  title        = {An Abstract Theory of Computer Viruses},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {354--374},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_28},
  doi          = {10.1007/0-387-34799-2\_28},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Adleman88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bach88,
  author       = {Eric Bach},
  editor       = {Shafi Goldwasser},
  title        = {Intractable Problems in Number Theory},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {77--93},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_7},
  doi          = {10.1007/0-387-34799-2\_7},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Bach88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareM88,
  author       = {Mihir Bellare and
                  Silvio Micali},
  editor       = {Shafi Goldwasser},
  title        = {How To Sign Given Any Trapdoor Function},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {200--215},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_15},
  doi          = {10.1007/0-387-34799-2\_15},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-OrGGHKMR88,
  author       = {Michael Ben{-}Or and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Johan H{\aa}stad and
                  Joe Kilian and
                  Silvio Micali and
                  Phillip Rogaway},
  editor       = {Shafi Goldwasser},
  title        = {Everything Provable is Provable in Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {37--56},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_4},
  doi          = {10.1007/0-387-34799-2\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-OrGGHKMR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlumFM88,
  author       = {Manuel Blum and
                  Paul Feldman and
                  Silvio Micali},
  editor       = {Shafi Goldwasser},
  title        = {Proving Security Against Chosen Cyphertext Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {256--268},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_20},
  doi          = {10.1007/0-387-34799-2\_20},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlumFM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Boer88,
  author       = {Bert den Boer},
  editor       = {Shafi Goldwasser},
  title        = {Diffie-Hellman is as Strong as Discrete Log for Certain Primes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {530--539},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_38},
  doi          = {10.1007/0-387-34799-2\_38},
  timestamp    = {Wed, 12 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Boer88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrandtDLP88,
  author       = {J{\o}rgen Brandt and
                  Ivan Damg{\aa}rd and
                  Peter Landrock and
                  Torben P. Pedersen},
  editor       = {Shafi Goldwasser},
  title        = {Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended
                  Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {583--588},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_43},
  doi          = {10.1007/0-387-34799-2\_43},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrandtDLP88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrassardD88,
  author       = {Gilles Brassard and
                  Ivan Damg{\aa}rd},
  editor       = {Shafi Goldwasser},
  title        = {"Practical IP" {\textless}= {MA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {580--582},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_42},
  doi          = {10.1007/0-387-34799-2\_42},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrassardD88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrickellS88,
  author       = {Ernest F. Brickell and
                  Douglas R. Stinson},
  editor       = {Shafi Goldwasser},
  title        = {The Detection of Cheaters in Threshold Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {564--577},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_40},
  doi          = {10.1007/0-387-34799-2\_40},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrickellS88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumFN88,
  author       = {David Chaum and
                  Amos Fiat and
                  Moni Naor},
  editor       = {Shafi Goldwasser},
  title        = {Untraceable Electronic Cash},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {319--327},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_25},
  doi          = {10.1007/0-387-34799-2\_25},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumFN88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CrepeauK88,
  author       = {Claude Cr{\'{e}}peau and
                  Joe Kilian},
  editor       = {Shafi Goldwasser},
  title        = {Weakening Security Assumptions and Oblivious Transfer (Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {2--7},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_1},
  doi          = {10.1007/0-387-34799-2\_1},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CrepeauK88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Damgard88,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Shafi Goldwasser},
  title        = {On the Randomness of Legendre and Jacobi Sequences},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {163--172},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_13},
  doi          = {10.1007/0-387-34799-2\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Damgard88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Damgard88a,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Shafi Goldwasser},
  title        = {Payment Systems and Credential Mechanisms with Provable Security Against
                  Abuse by Individuals},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {328--335},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_26},
  doi          = {10.1007/0-387-34799-2\_26},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Damgard88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Desmedt88,
  author       = {Yvo Desmedt},
  editor       = {Shafi Goldwasser},
  title        = {Abuses in Cryptography and How to Fight Them},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {375--389},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_29},
  doi          = {10.1007/0-387-34799-2\_29},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Desmedt88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DworkS88,
  author       = {Cynthia Dwork and
                  Larry J. Stockmeyer},
  editor       = {Shafi Goldwasser},
  title        = {Zero-Knowledge With Finite State Verifiers},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {71--75},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_6},
  doi          = {10.1007/0-387-34799-2\_6},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DworkS88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FeigeST88,
  author       = {Uriel Feige and
                  Adi Shamir and
                  Moshe Tennenholtz},
  editor       = {Shafi Goldwasser},
  title        = {The Noisy Oracle Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {284--296},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_22},
  doi          = {10.1007/0-387-34799-2\_22},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FeigeST88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Forre88,
  author       = {R{\'{e}}jane Forr{\'{e}}},
  editor       = {Shafi Goldwasser},
  title        = {The Strict Avalanche Criterion: Spectral Properties of Boolean Functions
                  and an Extended Definition},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {450--468},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_31},
  doi          = {10.1007/0-387-34799-2\_31},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Forre88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GiraultTV88,
  author       = {Marc Girault and
                  Philippe Toffin and
                  Brigitte Vall{\'{e}}e},
  editor       = {Shafi Goldwasser},
  title        = {Computation of Approximate L-th Roots Modulo \emph{n} and Application
                  to Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {100--117},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_9},
  doi          = {10.1007/0-387-34799-2\_9},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GiraultTV88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldreichK88,
  author       = {Oded Goldreich and
                  Eyal Kushilevitz},
  editor       = {Shafi Goldwasser},
  title        = {A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete
                  Logarithm},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {57--70},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_5},
  doi          = {10.1007/0-387-34799-2\_5},
  timestamp    = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldreichK88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldreichKL88,
  author       = {Oded Goldreich and
                  Hugo Krawczyk and
                  Michael Luby},
  editor       = {Shafi Goldwasser},
  title        = {On the Existence of Pseudorandom Generators},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {146--162},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_12},
  doi          = {10.1007/0-387-34799-2\_12},
  timestamp    = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldreichKL88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuillouQ88,
  author       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  editor       = {Shafi Goldwasser},
  title        = {A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {216--231},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_16},
  doi          = {10.1007/0-387-34799-2\_16},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GuillouQ88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Herbison88,
  author       = {B. J. Herbison},
  editor       = {Shafi Goldwasser},
  title        = {Developing Ethernet Enhanced-Security System},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {507--519},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_36},
  doi          = {10.1007/0-387-34799-2\_36},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Herbison88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HuangT88,
  author       = {Ming{-}Deh A. Huang and
                  Shang{-}Hua Teng},
  editor       = {Shafi Goldwasser},
  title        = {A Universal Problem in Secure and Verifiable Distributed Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {336--352},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_27},
  doi          = {10.1007/0-387-34799-2\_27},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HuangT88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HwangR88,
  author       = {Tzonelih Hwang and
                  T. R. N. Rao},
  editor       = {Shafi Goldwasser},
  title        = {Secret Error-Correcting Codes {(SECC)}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {540--563},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_39},
  doi          = {10.1007/0-387-34799-2\_39},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HwangR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ImpagliazzoR88,
  author       = {Russell Impagliazzo and
                  Steven Rudich},
  editor       = {Shafi Goldwasser},
  title        = {Limits on the Provable Consequences of One-way Permutations},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {8--26},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_2},
  doi          = {10.1007/0-387-34799-2\_2},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ImpagliazzoR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Koblitz88,
  author       = {Neal Koblitz},
  editor       = {Shafi Goldwasser},
  title        = {A Family of Jacobians Suitable for Discrete Log Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {94--99},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_8},
  doi          = {10.1007/0-387-34799-2\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Koblitz88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KurtzMR88,
  author       = {Stuart A. Kurtz and
                  Stephen R. Mahaney and
                  James S. Royer},
  editor       = {Shafi Goldwasser},
  title        = {On the Power of 1-way Functions (Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {578--579},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_41},
  doi          = {10.1007/0-387-34799-2\_41},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KurtzMR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KwokB88,
  author       = {Richard T. C. Kwok and
                  Maurice Beale},
  editor       = {Shafi Goldwasser},
  title        = {Aperiodic Linear Complexities of de Bruijn Sequences},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {479--482},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_33},
  doi          = {10.1007/0-387-34799-2\_33},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KwokB88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Leichter88,
  author       = {Josh Cohen Benaloh and
                  Jerry Leichter},
  editor       = {Shafi Goldwasser},
  title        = {Generalized Secret Sharing and Monotone Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {27--35},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_3},
  doi          = {10.1007/0-387-34799-2\_3},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Leichter88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Lucks88,
  author       = {Michael Lucks},
  editor       = {Shafi Goldwasser},
  title        = {A Constraint Satisfaction Algorithm for the Automated Decryption of
                  Simple Substitution Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {132--144},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_11},
  doi          = {10.1007/0-387-34799-2\_11},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Lucks88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MatsumotoKI88,
  author       = {Tsutomu Matsumoto and
                  Koki Kato and
                  Hideki Imai},
  editor       = {Shafi Goldwasser},
  title        = {Speeding Up Secret Computations with Insecure Auxiliary Devices},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {497--506},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_35},
  doi          = {10.1007/0-387-34799-2\_35},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MatsumotoKI88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MicaliS88,
  author       = {Silvio Micali and
                  Claus{-}Peter Schnorr},
  editor       = {Shafi Goldwasser},
  title        = {Efficient, Perfect Random Number Generators},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {173--198},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_14},
  doi          = {10.1007/0-387-34799-2\_14},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MicaliS88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MicaliS88a,
  author       = {Silvio Micali and
                  Adi Shamir},
  editor       = {Shafi Goldwasser},
  title        = {An Improvement of the Fiat-Shamir Identification and Signature Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {244--247},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_18},
  doi          = {10.1007/0-387-34799-2\_18},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MicaliS88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OhtaO88,
  author       = {Kazuo Ohta and
                  Tatsuaki Okamoto},
  editor       = {Shafi Goldwasser},
  title        = {A Modification of the Fiat-Shamir Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {232--243},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_17},
  doi          = {10.1007/0-387-34799-2\_17},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OhtaO88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Rackoff88,
  author       = {Charles Rackoff},
  editor       = {Shafi Goldwasser},
  title        = {A Basic Theory of Public and Private Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {249--255},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_19},
  doi          = {10.1007/0-387-34799-2\_19},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Rackoff88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SantisMP88,
  author       = {Alfredo De Santis and
                  Silvio Micali and
                  Giuseppe Persiano},
  editor       = {Shafi Goldwasser},
  title        = {Non-Interactive Zero-Knowledge with Preprocessing},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {269--282},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_21},
  doi          = {10.1007/0-387-34799-2\_21},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SantisMP88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SherwoodG88,
  author       = {J. R. Sherwood and
                  V. A. Gallo},
  editor       = {Shafi Goldwasser},
  title        = {The Application of Smart Cards for {RSA} Digital Signatures in a Network
                  Comprising both Interactive and Store-and-Foreward Facilities},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {484--496},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_34},
  doi          = {10.1007/0-387-34799-2\_34},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SherwoodG88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Simmons88,
  author       = {Gustavus J. Simmons},
  editor       = {Shafi Goldwasser},
  title        = {How to (Really) Share a Secret},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {390--448},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_30},
  doi          = {10.1007/0-387-34799-2\_30},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Simmons88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Soete88,
  author       = {Marijke De Soete},
  editor       = {Shafi Goldwasser},
  title        = {Bounds and Constructions for Authentication-Secrecy Codes with Splitting},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {311--317},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_24},
  doi          = {10.1007/0-387-34799-2\_24},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Soete88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SteerSDW88,
  author       = {David G. Steer and
                  Leo Strawczynski and
                  Whitfield Diffie and
                  Michael J. Wiener},
  editor       = {Shafi Goldwasser},
  title        = {A Secure Audio Teleconference System},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {520--528},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_37},
  doi          = {10.1007/0-387-34799-2\_37},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SteerSDW88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Tilburg88,
  author       = {Johan van Tilburg},
  editor       = {Shafi Goldwasser},
  title        = {On the McEliece Public-Key Cryptosystem},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {119--131},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_10},
  doi          = {10.1007/0-387-34799-2\_10},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Tilburg88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ZengH88,
  author       = {Kencheng Zeng and
                  Minqiang Huang},
  editor       = {Shafi Goldwasser},
  title        = {On the Linear Syndrome Method in Cryptanalysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {469--478},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_32},
  doi          = {10.1007/0-387-34799-2\_32},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ZengH88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics