Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/crypto/crypto89.bht:"
@proceedings{DBLP:conf/crypto/1989, editor = {Gilles Brassard}, title = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/0-387-34805-0}, doi = {10.1007/0-387-34805-0}, isbn = {3-540-97317-6}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/1989.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AdamsT89, author = {Carlisle M. Adams and Stafford E. Tavares}, editor = {Gilles Brassard}, title = {Good S-Boxes Are Easy To Find}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {612--615}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_56}, doi = {10.1007/0-387-34805-0\_56}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AdamsT89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarrettE89, author = {Paul Barrett and Raymund Eisele}, editor = {Gilles Brassard}, title = {The Smart Siskette - {A} Universal User Token and Personal Crypto-Engine}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {74--79}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_8}, doi = {10.1007/0-387-34805-0\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BarrettE89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Beaver89, author = {Donald Beaver}, editor = {Gilles Brassard}, title = {Multiparty Protocols Tolerating Half Faulty Processors}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {560--572}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_49}, doi = {10.1007/0-387-34805-0\_49}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Beaver89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeaverG89, author = {Donald Beaver and Shafi Goldwasser}, editor = {Gilles Brassard}, title = {Multiparty Computation with Faulty Majority}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {589--590}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_51}, doi = {10.1007/0-387-34805-0\_51}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeaverG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareCG89, author = {Mihir Bellare and Lenore Cowen and Shafi Goldwasser}, editor = {Gilles Brassard}, title = {On the Structure of Secret Key Exchange Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {604--605}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_53}, doi = {10.1007/0-387-34805-0\_53}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareCG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareG89, author = {Mihir Bellare and Shafi Goldwasser}, editor = {Gilles Brassard}, title = {New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {194--211}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_19}, doi = {10.1007/0-387-34805-0\_19}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareM89, author = {Mihir Bellare and Silvio Micali}, editor = {Gilles Brassard}, title = {Non-Interactive Oblivious Transfer and Spplications}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {547--557}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_48}, doi = {10.1007/0-387-34805-0\_48}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-OrGKW89, author = {Michael Ben{-}Or and Shafi Goldwasser and Joe Kilian and Avi Wigderson}, editor = {Gilles Brassard}, title = {Efficient Identification Schemes Using Two Prover Interactive Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {498--506}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_44}, doi = {10.1007/0-387-34805-0\_44}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-OrGKW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BenderC89, author = {Andreas Bender and Guy Castagnoli}, editor = {Gilles Brassard}, title = {On the Implementation of Elliptic Curve Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {186--192}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_18}, doi = {10.1007/0-387-34805-0\_18}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BenderC89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BosC89, author = {Jurjen N. Bos and Matthijs J. Coster}, editor = {Gilles Brassard}, title = {Addition Chain Heuristics}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {400--407}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_37}, doi = {10.1007/0-387-34805-0\_37}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BosC89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyarP89, author = {Joan Boyar and Ren{\'{e}} Peralta}, editor = {Gilles Brassard}, title = {On the Concrete Complexity of Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {507--525}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_45}, doi = {10.1007/0-387-34805-0\_45}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BoyarP89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Brand89, author = {Russell L. Brand}, editor = {Gilles Brassard}, title = {Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {30--34}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_4}, doi = {10.1007/0-387-34805-0\_4}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Brand89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Brickell89, author = {Ernest F. Brickell}, editor = {Gilles Brassard}, title = {A Survey of Hardware Implementation of {RSA} (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {368--370}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_34}, doi = {10.1007/0-387-34805-0\_34}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Brickell89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrickellD89, author = {Ernest F. Brickell and Daniel M. Davenport}, editor = {Gilles Brassard}, title = {On the Classification of Idea Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {278--285}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_25}, doi = {10.1007/0-387-34805-0\_25}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrickellD89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BuchmannW89, author = {Johannes Buchmann and Hugh C. Williams}, editor = {Gilles Brassard}, title = {A Key Exchange System Based on Real Quadratic Fields}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {335--343}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_31}, doi = {10.1007/0-387-34805-0\_31}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BuchmannW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChanG89, author = {Agnes Hui Chan and Richard A. Games}, editor = {Gilles Brassard}, title = {On the Quadratic Spans of Periodic Sequences}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {82--89}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_9}, doi = {10.1007/0-387-34805-0\_9}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChanG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chaum89, author = {David Chaum}, editor = {Gilles Brassard}, title = {The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {591--602}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_52}, doi = {10.1007/0-387-34805-0\_52}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Chaum89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumA89, author = {David Chaum and Hans Van Antwerpen}, editor = {Gilles Brassard}, title = {Undeniable Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {212--216}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_20}, doi = {10.1007/0-387-34805-0\_20}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumA89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChickT89, author = {Gerald C. Chick and Stafford E. Tavares}, editor = {Gilles Brassard}, title = {Flexible Access Control with Master Keys}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {316--322}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_29}, doi = {10.1007/0-387-34805-0\_29}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChickT89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChorK89, author = {Benny Chor and Eyal Kushilevitz}, editor = {Gilles Brassard}, title = {Secret Sharing Over Infinite Domains (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {299--306}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_27}, doi = {10.1007/0-387-34805-0\_27}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChorK89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Cleve89, author = {Richard Cleve}, editor = {Gilles Brassard}, title = {Controlled Gradual Disclosure Schemes for Random Bits and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {573--588}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_50}, doi = {10.1007/0-387-34805-0\_50}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Cleve89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Damgard89, author = {Ivan Damg{\aa}rd}, editor = {Gilles Brassard}, title = {On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {17--27}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_3}, doi = {10.1007/0-387-34805-0\_3}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Damgard89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Damgard89a, author = {Ivan Damg{\aa}rd}, editor = {Gilles Brassard}, title = {A Design Principle for Hash Functions}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {416--427}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_39}, doi = {10.1007/0-387-34805-0\_39}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Damgard89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Desmedt89, author = {Yvo Desmedt}, editor = {Gilles Brassard}, title = {Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {6--16}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_2}, doi = {10.1007/0-387-34805-0\_2}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Desmedt89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtF89, author = {Yvo Desmedt and Yair Frankel}, editor = {Gilles Brassard}, title = {Threshold Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {307--315}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_28}, doi = {10.1007/0-387-34805-0\_28}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtF89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EvenM89, author = {Shimon Even and Oded Goldreich and Silvio Micali}, editor = {Gilles Brassard}, title = {On-Line/Off-Line Digital Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {263--275}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_24}, doi = {10.1007/0-387-34805-0\_24}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/EvenM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FeigeS89, author = {Uriel Feige and Adi Shamir}, editor = {Gilles Brassard}, title = {Zero Knowledge Proofs of Knowledge in Two Rounds}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {526--544}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_46}, doi = {10.1007/0-387-34805-0\_46}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FeigeS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FeldmeierK89, author = {David C. Feldmeier and Philip R. Karn}, editor = {Gilles Brassard}, title = {{UNIX} Password Security - Ten Years Later}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {44--63}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_6}, doi = {10.1007/0-387-34805-0\_6}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FeldmeierK89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Fiat89, author = {Amos Fiat}, editor = {Gilles Brassard}, title = {Batch {RSA}}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {175--185}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_17}, doi = {10.1007/0-387-34805-0\_17}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Fiat89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FindlayJ89, author = {Paul A. Findlay and Brian A. Johnson}, editor = {Gilles Brassard}, title = {Modular Exponentiation Using Recursive Sums of Residues}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {371--386}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_35}, doi = {10.1007/0-387-34805-0\_35}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FindlayJ89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldreichK89, author = {Oded Goldreich and Hugo Krawczyk}, editor = {Gilles Brassard}, title = {Sparse Pseudorandom Distributions}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {113--127}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_12}, doi = {10.1007/0-387-34805-0\_12}, timestamp = {Wed, 15 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoldreichK89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JansenB89, author = {Cees J. A. Jansen and Dick E. Boekee}, editor = {Gilles Brassard}, title = {The Shortest Feedback Shift Register That Can Generate {A} Given Sequence}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {90--99}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_10}, doi = {10.1007/0-387-34805-0\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JansenB89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kahn89, author = {David Kahn}, editor = {Gilles Brassard}, title = {Keying the German Navy's Enigma}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {2--5}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_1}, doi = {10.1007/0-387-34805-0\_1}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kahn89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KilianO89, author = {Joe Kilian and Silvio Micali and Rafail Ostrovsky}, editor = {Gilles Brassard}, title = {Minimum Resource Zero-Knowledge Proofs (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {545--546}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_47}, doi = {10.1007/0-387-34805-0\_47}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KilianO89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kohl89, author = {John T. Kohl}, editor = {Gilles Brassard}, title = {The use of Encryption in Kerberos for Network Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {35--43}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_5}, doi = {10.1007/0-387-34805-0\_5}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kohl89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Krawczyk89, author = {Hugo Krawczyk}, editor = {Gilles Brassard}, title = {How to Predict Congruential Generators}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {138--153}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_14}, doi = {10.1007/0-387-34805-0\_14}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Krawczyk89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LaihLH89, author = {Chi{-}Sung Laih and Lein Harn and Jau{-}Yien Lee and Tzonelih Hwang}, editor = {Gilles Brassard}, title = {Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {286--298}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_26}, doi = {10.1007/0-387-34805-0\_26}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LaihLH89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MagliverasM89, author = {Spyros S. Magliveras and Nasir D. Memon}, editor = {Gilles Brassard}, title = {Properties of Cryptosystem {PGM}}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {447--460}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_41}, doi = {10.1007/0-387-34805-0\_41}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MagliverasM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MaurerM89, author = {Ueli M. Maurer and James L. Massey}, editor = {Gilles Brassard}, title = {Perfect Local Randomness in Pseudo-Random Sequences}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {100--112}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_11}, doi = {10.1007/0-387-34805-0\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MaurerM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Merkle89, author = {Ralph C. Merkle}, editor = {Gilles Brassard}, title = {A Certified Digital Signature}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {218--238}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_21}, doi = {10.1007/0-387-34805-0\_21}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Merkle89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Merkle89a, author = {Ralph C. Merkle}, editor = {Gilles Brassard}, title = {One Way Hash Functions and {DES}}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {428--446}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_40}, doi = {10.1007/0-387-34805-0\_40}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Merkle89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Miyaguchi89, author = {Shoji Miyaguchi}, editor = {Gilles Brassard}, title = {The {FEAL-8} Cryptosystem and a Call for Attack}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {624--627}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_59}, doi = {10.1007/0-387-34805-0\_59}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Miyaguchi89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Morita89, author = {Hikaru Morita}, editor = {Gilles Brassard}, title = {A Fast Modular-multiplication Algorithm based on a Higher Radix}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {387--399}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_36}, doi = {10.1007/0-387-34805-0\_36}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Morita89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Naor89, author = {Moni Naor}, editor = {Gilles Brassard}, title = {Bit Commitment Using Pseudo-Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {128--136}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_13}, doi = {10.1007/0-387-34805-0\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Naor89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NelsonH89, author = {Ruth Nelson and John H. Heimann}, editor = {Gilles Brassard}, title = {{SDNS} Architecture and End-to-End Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {356--366}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_33}, doi = {10.1007/0-387-34805-0\_33}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NelsonH89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoO89, author = {Tatsuaki Okamoto and Kazuo Ohta}, editor = {Gilles Brassard}, title = {Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {481--496}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_43}, doi = {10.1007/0-387-34805-0\_43}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoO89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ostrovsky89, author = {Rafail Ostrovsky}, editor = {Gilles Brassard}, title = {An Efficient Software Protection Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {610--611}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_55}, doi = {10.1007/0-387-34805-0\_55}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ostrovsky89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PreneelBGV89, author = {Bart Preneel and Antoon Bosselaers and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Gilles Brassard}, title = {A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {154--163}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_15}, doi = {10.1007/0-387-34805-0\_15}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PreneelBGV89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Price89, author = {Wyn L. Price}, editor = {Gilles Brassard}, title = {Progress in Data Security Standardization}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {620--623}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_58}, doi = {10.1007/0-387-34805-0\_58}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Price89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuisquaterD89, author = {Jean{-}Jacques Quisquater and Jean{-}Paul Delescaille}, editor = {Gilles Brassard}, title = {How Easy is Collision Search. New Results and Applications to {DES}}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {408--413}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_38}, doi = {10.1007/0-387-34805-0\_38}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/QuisquaterD89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuisquaterQQQGGGGGGB89, author = {Jean{-}Jacques Quisquater and Myriam Quisquater and Muriel Quisquater and Micha{\"{e}}l Quisquater and Louis C. Guillou and Marie Annick Guillou and Ga{\"{\i}}d Guillou and Anna Guillou and Gwenol{\'{e}} Guillou and Soazig Guillou and Thomas A. Berson}, editor = {Gilles Brassard}, title = {How to Explain Zero-Knowledge Protocols to Your Children}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {628--631}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_60}, doi = {10.1007/0-387-34805-0\_60}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/QuisquaterQQQGGGGGGB89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Schnorr89, author = {Claus{-}Peter Schnorr}, editor = {Gilles Brassard}, title = {Efficient Identification and Signatures for Smart Cards}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {239--252}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_22}, doi = {10.1007/0-387-34805-0\_22}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Schnorr89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Shamir89, author = {Adi Shamir}, editor = {Gilles Brassard}, title = {An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {606--609}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_54}, doi = {10.1007/0-387-34805-0\_54}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Shamir89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Smith89, author = {Jonathan M. Smith}, editor = {Gilles Brassard}, title = {Practical Problems with a Cryptographic Protection Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {64--73}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_7}, doi = {10.1007/0-387-34805-0\_7}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Smith89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SoeteQV89, author = {Marijke De Soete and Jean{-}Jacques Quisquater and Klaus Vedder}, editor = {Gilles Brassard}, title = {A Signature with Shared Verification Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {253--262}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_23}, doi = {10.1007/0-387-34805-0\_23}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SoeteQV89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/TatebayashiMN89, author = {Makoto Tatebayashi and Natsume Matsuzaki and David B. Newman Jr.}, editor = {Gilles Brassard}, title = {Key Distribution Protocol for Digital Mobile Communication Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {324--334}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_30}, doi = {10.1007/0-387-34805-0\_30}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/TatebayashiMN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/White89, author = {Steve R. White}, editor = {Gilles Brassard}, title = {Covert Distributed Processing with Computer Viruses}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {616--619}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_57}, doi = {10.1007/0-387-34805-0\_57}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/White89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YacobiS89, author = {Yacov Yacobi and Zahava Shmuely}, editor = {Gilles Brassard}, title = {On Key Distribution Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {344--355}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_32}, doi = {10.1007/0-387-34805-0\_32}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YacobiS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ZengYR89, author = {Kencheng Zeng and Chung{-}Huang Yang and T. R. N. Rao}, editor = {Gilles Brassard}, title = {On the Linear Consistency Test {(LCT)} in Cryptanalysis with Applications}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {164--174}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_16}, doi = {10.1007/0-387-34805-0\_16}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ZengYR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ZhengI89, author = {Yuliang Zheng and Tsutomu Matsumoto and Hideki Imai}, editor = {Gilles Brassard}, title = {On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {461--480}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_42}, doi = {10.1007/0-387-34805-0\_42}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ZhengI89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.