Search dblp for Publications

export results for "toc:db/conf/crypto/crypto89.bht:"

 download as .bib file

@proceedings{DBLP:conf/crypto/1989,
  editor       = {Gilles Brassard},
  title        = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/0-387-34805-0},
  doi          = {10.1007/0-387-34805-0},
  isbn         = {3-540-97317-6},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/1989.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AdamsT89,
  author       = {Carlisle M. Adams and
                  Stafford E. Tavares},
  editor       = {Gilles Brassard},
  title        = {Good S-Boxes Are Easy To Find},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {612--615},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_56},
  doi          = {10.1007/0-387-34805-0\_56},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AdamsT89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarrettE89,
  author       = {Paul Barrett and
                  Raymund Eisele},
  editor       = {Gilles Brassard},
  title        = {The Smart Siskette - {A} Universal User Token and Personal Crypto-Engine},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {74--79},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_8},
  doi          = {10.1007/0-387-34805-0\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BarrettE89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Beaver89,
  author       = {Donald Beaver},
  editor       = {Gilles Brassard},
  title        = {Multiparty Protocols Tolerating Half Faulty Processors},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {560--572},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_49},
  doi          = {10.1007/0-387-34805-0\_49},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Beaver89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeaverG89,
  author       = {Donald Beaver and
                  Shafi Goldwasser},
  editor       = {Gilles Brassard},
  title        = {Multiparty Computation with Faulty Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {589--590},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_51},
  doi          = {10.1007/0-387-34805-0\_51},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeaverG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareCG89,
  author       = {Mihir Bellare and
                  Lenore Cowen and
                  Shafi Goldwasser},
  editor       = {Gilles Brassard},
  title        = {On the Structure of Secret Key Exchange Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {604--605},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_53},
  doi          = {10.1007/0-387-34805-0\_53},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareCG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareG89,
  author       = {Mihir Bellare and
                  Shafi Goldwasser},
  editor       = {Gilles Brassard},
  title        = {New Paradigms for Digital Signatures and Message Authentication Based
                  on Non-Interative Zero Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {194--211},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_19},
  doi          = {10.1007/0-387-34805-0\_19},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareM89,
  author       = {Mihir Bellare and
                  Silvio Micali},
  editor       = {Gilles Brassard},
  title        = {Non-Interactive Oblivious Transfer and Spplications},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {547--557},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_48},
  doi          = {10.1007/0-387-34805-0\_48},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-OrGKW89,
  author       = {Michael Ben{-}Or and
                  Shafi Goldwasser and
                  Joe Kilian and
                  Avi Wigderson},
  editor       = {Gilles Brassard},
  title        = {Efficient Identification Schemes Using Two Prover Interactive Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {498--506},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_44},
  doi          = {10.1007/0-387-34805-0\_44},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-OrGKW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenderC89,
  author       = {Andreas Bender and
                  Guy Castagnoli},
  editor       = {Gilles Brassard},
  title        = {On the Implementation of Elliptic Curve Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {186--192},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_18},
  doi          = {10.1007/0-387-34805-0\_18},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BenderC89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BosC89,
  author       = {Jurjen N. Bos and
                  Matthijs J. Coster},
  editor       = {Gilles Brassard},
  title        = {Addition Chain Heuristics},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {400--407},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_37},
  doi          = {10.1007/0-387-34805-0\_37},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BosC89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyarP89,
  author       = {Joan Boyar and
                  Ren{\'{e}} Peralta},
  editor       = {Gilles Brassard},
  title        = {On the Concrete Complexity of Zero-Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {507--525},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_45},
  doi          = {10.1007/0-387-34805-0\_45},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyarP89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Brand89,
  author       = {Russell L. Brand},
  editor       = {Gilles Brassard},
  title        = {Problems with the Normal Use of Cryptography for Providing Security
                  on Unclassified Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {30--34},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_4},
  doi          = {10.1007/0-387-34805-0\_4},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Brand89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Brickell89,
  author       = {Ernest F. Brickell},
  editor       = {Gilles Brassard},
  title        = {A Survey of Hardware Implementation of {RSA} (Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {368--370},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_34},
  doi          = {10.1007/0-387-34805-0\_34},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Brickell89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrickellD89,
  author       = {Ernest F. Brickell and
                  Daniel M. Davenport},
  editor       = {Gilles Brassard},
  title        = {On the Classification of Idea Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {278--285},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_25},
  doi          = {10.1007/0-387-34805-0\_25},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrickellD89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BuchmannW89,
  author       = {Johannes Buchmann and
                  Hugh C. Williams},
  editor       = {Gilles Brassard},
  title        = {A Key Exchange System Based on Real Quadratic Fields},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {335--343},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_31},
  doi          = {10.1007/0-387-34805-0\_31},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BuchmannW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChanG89,
  author       = {Agnes Hui Chan and
                  Richard A. Games},
  editor       = {Gilles Brassard},
  title        = {On the Quadratic Spans of Periodic Sequences},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {82--89},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_9},
  doi          = {10.1007/0-387-34805-0\_9},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChanG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chaum89,
  author       = {David Chaum},
  editor       = {Gilles Brassard},
  title        = {The Spymasters Double-Agent Problem: Multiparty Computations Secure
                  Unconditionally from Minorities and Cryptographically from Majorities},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {591--602},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_52},
  doi          = {10.1007/0-387-34805-0\_52},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Chaum89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumA89,
  author       = {David Chaum and
                  Hans Van Antwerpen},
  editor       = {Gilles Brassard},
  title        = {Undeniable Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {212--216},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_20},
  doi          = {10.1007/0-387-34805-0\_20},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumA89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChickT89,
  author       = {Gerald C. Chick and
                  Stafford E. Tavares},
  editor       = {Gilles Brassard},
  title        = {Flexible Access Control with Master Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {316--322},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_29},
  doi          = {10.1007/0-387-34805-0\_29},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChickT89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChorK89,
  author       = {Benny Chor and
                  Eyal Kushilevitz},
  editor       = {Gilles Brassard},
  title        = {Secret Sharing Over Infinite Domains (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {299--306},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_27},
  doi          = {10.1007/0-387-34805-0\_27},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChorK89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Cleve89,
  author       = {Richard Cleve},
  editor       = {Gilles Brassard},
  title        = {Controlled Gradual Disclosure Schemes for Random Bits and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {573--588},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_50},
  doi          = {10.1007/0-387-34805-0\_50},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Cleve89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Damgard89,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Gilles Brassard},
  title        = {On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {17--27},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_3},
  doi          = {10.1007/0-387-34805-0\_3},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Damgard89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Damgard89a,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Gilles Brassard},
  title        = {A Design Principle for Hash Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {416--427},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_39},
  doi          = {10.1007/0-387-34805-0\_39},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Damgard89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Desmedt89,
  author       = {Yvo Desmedt},
  editor       = {Gilles Brassard},
  title        = {Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free
                  in a General Context},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {6--16},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_2},
  doi          = {10.1007/0-387-34805-0\_2},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Desmedt89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtF89,
  author       = {Yvo Desmedt and
                  Yair Frankel},
  editor       = {Gilles Brassard},
  title        = {Threshold Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {307--315},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_28},
  doi          = {10.1007/0-387-34805-0\_28},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtF89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EvenM89,
  author       = {Shimon Even and
                  Oded Goldreich and
                  Silvio Micali},
  editor       = {Gilles Brassard},
  title        = {On-Line/Off-Line Digital Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {263--275},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_24},
  doi          = {10.1007/0-387-34805-0\_24},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/EvenM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FeigeS89,
  author       = {Uriel Feige and
                  Adi Shamir},
  editor       = {Gilles Brassard},
  title        = {Zero Knowledge Proofs of Knowledge in Two Rounds},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {526--544},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_46},
  doi          = {10.1007/0-387-34805-0\_46},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FeigeS89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FeldmeierK89,
  author       = {David C. Feldmeier and
                  Philip R. Karn},
  editor       = {Gilles Brassard},
  title        = {{UNIX} Password Security - Ten Years Later},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_6},
  doi          = {10.1007/0-387-34805-0\_6},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FeldmeierK89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Fiat89,
  author       = {Amos Fiat},
  editor       = {Gilles Brassard},
  title        = {Batch {RSA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {175--185},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_17},
  doi          = {10.1007/0-387-34805-0\_17},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Fiat89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FindlayJ89,
  author       = {Paul A. Findlay and
                  Brian A. Johnson},
  editor       = {Gilles Brassard},
  title        = {Modular Exponentiation Using Recursive Sums of Residues},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {371--386},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_35},
  doi          = {10.1007/0-387-34805-0\_35},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FindlayJ89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldreichK89,
  author       = {Oded Goldreich and
                  Hugo Krawczyk},
  editor       = {Gilles Brassard},
  title        = {Sparse Pseudorandom Distributions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {113--127},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_12},
  doi          = {10.1007/0-387-34805-0\_12},
  timestamp    = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldreichK89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JansenB89,
  author       = {Cees J. A. Jansen and
                  Dick E. Boekee},
  editor       = {Gilles Brassard},
  title        = {The Shortest Feedback Shift Register That Can Generate {A} Given Sequence},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {90--99},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_10},
  doi          = {10.1007/0-387-34805-0\_10},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JansenB89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kahn89,
  author       = {David Kahn},
  editor       = {Gilles Brassard},
  title        = {Keying the German Navy's Enigma},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {2--5},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_1},
  doi          = {10.1007/0-387-34805-0\_1},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kahn89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KilianO89,
  author       = {Joe Kilian and
                  Silvio Micali and
                  Rafail Ostrovsky},
  editor       = {Gilles Brassard},
  title        = {Minimum Resource Zero-Knowledge Proofs (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {545--546},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_47},
  doi          = {10.1007/0-387-34805-0\_47},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KilianO89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kohl89,
  author       = {John T. Kohl},
  editor       = {Gilles Brassard},
  title        = {The use of Encryption in Kerberos for Network Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {35--43},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_5},
  doi          = {10.1007/0-387-34805-0\_5},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kohl89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Krawczyk89,
  author       = {Hugo Krawczyk},
  editor       = {Gilles Brassard},
  title        = {How to Predict Congruential Generators},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {138--153},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_14},
  doi          = {10.1007/0-387-34805-0\_14},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Krawczyk89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LaihLH89,
  author       = {Chi{-}Sung Laih and
                  Lein Harn and
                  Jau{-}Yien Lee and
                  Tzonelih Hwang},
  editor       = {Gilles Brassard},
  title        = {Dynamic Threshold Scheme Based on the Definition of Cross-Product
                  in an N-Dimentional Linear Space},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {286--298},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_26},
  doi          = {10.1007/0-387-34805-0\_26},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LaihLH89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MagliverasM89,
  author       = {Spyros S. Magliveras and
                  Nasir D. Memon},
  editor       = {Gilles Brassard},
  title        = {Properties of Cryptosystem {PGM}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {447--460},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_41},
  doi          = {10.1007/0-387-34805-0\_41},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MagliverasM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MaurerM89,
  author       = {Ueli M. Maurer and
                  James L. Massey},
  editor       = {Gilles Brassard},
  title        = {Perfect Local Randomness in Pseudo-Random Sequences},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {100--112},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_11},
  doi          = {10.1007/0-387-34805-0\_11},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MaurerM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Merkle89,
  author       = {Ralph C. Merkle},
  editor       = {Gilles Brassard},
  title        = {A Certified Digital Signature},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {218--238},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_21},
  doi          = {10.1007/0-387-34805-0\_21},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Merkle89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Merkle89a,
  author       = {Ralph C. Merkle},
  editor       = {Gilles Brassard},
  title        = {One Way Hash Functions and {DES}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {428--446},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_40},
  doi          = {10.1007/0-387-34805-0\_40},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Merkle89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Miyaguchi89,
  author       = {Shoji Miyaguchi},
  editor       = {Gilles Brassard},
  title        = {The {FEAL-8} Cryptosystem and a Call for Attack},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {624--627},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_59},
  doi          = {10.1007/0-387-34805-0\_59},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Miyaguchi89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Morita89,
  author       = {Hikaru Morita},
  editor       = {Gilles Brassard},
  title        = {A Fast Modular-multiplication Algorithm based on a Higher Radix},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {387--399},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_36},
  doi          = {10.1007/0-387-34805-0\_36},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Morita89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Naor89,
  author       = {Moni Naor},
  editor       = {Gilles Brassard},
  title        = {Bit Commitment Using Pseudo-Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {128--136},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_13},
  doi          = {10.1007/0-387-34805-0\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Naor89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NelsonH89,
  author       = {Ruth Nelson and
                  John H. Heimann},
  editor       = {Gilles Brassard},
  title        = {{SDNS} Architecture and End-to-End Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {356--366},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_33},
  doi          = {10.1007/0-387-34805-0\_33},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NelsonH89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoO89,
  author       = {Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Gilles Brassard},
  title        = {Disposable Zero-Knowledge Authentications and Their Applications to
                  Untraceable Electronic Cash},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {481--496},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_43},
  doi          = {10.1007/0-387-34805-0\_43},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoO89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ostrovsky89,
  author       = {Rafail Ostrovsky},
  editor       = {Gilles Brassard},
  title        = {An Efficient Software Protection Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {610--611},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_55},
  doi          = {10.1007/0-387-34805-0\_55},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ostrovsky89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PreneelBGV89,
  author       = {Bart Preneel and
                  Antoon Bosselaers and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Gilles Brassard},
  title        = {A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm
                  of Cohen and Huang},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {154--163},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_15},
  doi          = {10.1007/0-387-34805-0\_15},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PreneelBGV89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Price89,
  author       = {Wyn L. Price},
  editor       = {Gilles Brassard},
  title        = {Progress in Data Security Standardization},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {620--623},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_58},
  doi          = {10.1007/0-387-34805-0\_58},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Price89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/QuisquaterD89,
  author       = {Jean{-}Jacques Quisquater and
                  Jean{-}Paul Delescaille},
  editor       = {Gilles Brassard},
  title        = {How Easy is Collision Search. New Results and Applications to {DES}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {408--413},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_38},
  doi          = {10.1007/0-387-34805-0\_38},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/QuisquaterD89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/QuisquaterQQQGGGGGGB89,
  author       = {Jean{-}Jacques Quisquater and
                  Myriam Quisquater and
                  Muriel Quisquater and
                  Micha{\"{e}}l Quisquater and
                  Louis C. Guillou and
                  Marie Annick Guillou and
                  Ga{\"{\i}}d Guillou and
                  Anna Guillou and
                  Gwenol{\'{e}} Guillou and
                  Soazig Guillou and
                  Thomas A. Berson},
  editor       = {Gilles Brassard},
  title        = {How to Explain Zero-Knowledge Protocols to Your Children},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {628--631},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_60},
  doi          = {10.1007/0-387-34805-0\_60},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/QuisquaterQQQGGGGGGB89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Schnorr89,
  author       = {Claus{-}Peter Schnorr},
  editor       = {Gilles Brassard},
  title        = {Efficient Identification and Signatures for Smart Cards},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {239--252},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_22},
  doi          = {10.1007/0-387-34805-0\_22},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Schnorr89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Shamir89,
  author       = {Adi Shamir},
  editor       = {Gilles Brassard},
  title        = {An Efficient Identification Scheme Based on Permuted Kernels (Extended
                  Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {606--609},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_54},
  doi          = {10.1007/0-387-34805-0\_54},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Shamir89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Smith89,
  author       = {Jonathan M. Smith},
  editor       = {Gilles Brassard},
  title        = {Practical Problems with a Cryptographic Protection Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {64--73},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_7},
  doi          = {10.1007/0-387-34805-0\_7},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Smith89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SoeteQV89,
  author       = {Marijke De Soete and
                  Jean{-}Jacques Quisquater and
                  Klaus Vedder},
  editor       = {Gilles Brassard},
  title        = {A Signature with Shared Verification Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {253--262},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_23},
  doi          = {10.1007/0-387-34805-0\_23},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SoeteQV89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/TatebayashiMN89,
  author       = {Makoto Tatebayashi and
                  Natsume Matsuzaki and
                  David B. Newman Jr.},
  editor       = {Gilles Brassard},
  title        = {Key Distribution Protocol for Digital Mobile Communication Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {324--334},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_30},
  doi          = {10.1007/0-387-34805-0\_30},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/TatebayashiMN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/White89,
  author       = {Steve R. White},
  editor       = {Gilles Brassard},
  title        = {Covert Distributed Processing with Computer Viruses},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {616--619},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_57},
  doi          = {10.1007/0-387-34805-0\_57},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/White89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YacobiS89,
  author       = {Yacov Yacobi and
                  Zahava Shmuely},
  editor       = {Gilles Brassard},
  title        = {On Key Distribution Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {344--355},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_32},
  doi          = {10.1007/0-387-34805-0\_32},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YacobiS89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ZengYR89,
  author       = {Kencheng Zeng and
                  Chung{-}Huang Yang and
                  T. R. N. Rao},
  editor       = {Gilles Brassard},
  title        = {On the Linear Consistency Test {(LCT)} in Cryptanalysis with Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {164--174},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_16},
  doi          = {10.1007/0-387-34805-0\_16},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ZengYR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ZhengI89,
  author       = {Yuliang Zheng and
                  Tsutomu Matsumoto and
                  Hideki Imai},
  editor       = {Gilles Brassard},
  title        = {On the Construction of Block Ciphers Provably Secure and Not Relying
                  on Any Unproved Hypotheses},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {461--480},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_42},
  doi          = {10.1007/0-387-34805-0\_42},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ZhengI89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics