- Paul A. Findlay, Brian A. Johnson:
Modular Exponentiation Using Recursive Sums of Residues. CRYPTO 1989: 371-386 - Oded Goldreich, Hugo Krawczyk:
Sparse Pseudorandom Distributions. CRYPTO 1989: 113-127 - Cees J. A. Jansen, Dick E. Boekee:
The Shortest Feedback Shift Register That Can Generate A Given Sequence. CRYPTO 1989: 90-99 - David Kahn:
Keying the German Navy's Enigma. CRYPTO 1989: 2-5 - Joe Kilian, Silvio Micali, Rafail Ostrovsky:
Minimum Resource Zero-Knowledge Proofs (Extended Abstract). CRYPTO 1989: 545-546 - John T. Kohl:
The use of Encryption in Kerberos for Network Authentication. CRYPTO 1989: 35-43 - Hugo Krawczyk:
How to Predict Congruential Generators. CRYPTO 1989: 138-153 - Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang:
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. CRYPTO 1989: 286-298 - Spyros S. Magliveras, Nasir D. Memon:
Properties of Cryptosystem PGM. CRYPTO 1989: 447-460 - Ueli M. Maurer, James L. Massey:
Perfect Local Randomness in Pseudo-Random Sequences. CRYPTO 1989: 100-112 - Ralph C. Merkle:
A Certified Digital Signature. CRYPTO 1989: 218-238 - Ralph C. Merkle:
One Way Hash Functions and DES. CRYPTO 1989: 428-446 - Shoji Miyaguchi:
The FEAL-8 Cryptosystem and a Call for Attack. CRYPTO 1989: 624-627 - Hikaru Morita:
A Fast Modular-multiplication Algorithm based on a Higher Radix. CRYPTO 1989: 387-399 - Moni Naor:
Bit Commitment Using Pseudo-Randomness. CRYPTO 1989: 128-136 - Ruth Nelson, John H. Heimann:
SDNS Architecture and End-to-End Encryption. CRYPTO 1989: 356-366 - Tatsuaki Okamoto, Kazuo Ohta:
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. CRYPTO 1989: 481-496 - Rafail Ostrovsky:
An Efficient Software Protection Scheme. CRYPTO 1989: 610-611 - Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle:
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. CRYPTO 1989: 154-163 - Wyn L. Price:
Progress in Data Security Standardization. CRYPTO 1989: 620-623 - Jean-Jacques Quisquater, Jean-Paul Delescaille:
How Easy is Collision Search. New Results and Applications to DES. CRYPTO 1989: 408-413 - Jean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson:
How to Explain Zero-Knowledge Protocols to Your Children. CRYPTO 1989: 628-631 - Claus-Peter Schnorr:
Efficient Identification and Signatures for Smart Cards. CRYPTO 1989: 239-252 - Adi Shamir:
An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract). CRYPTO 1989: 606-609 - Jonathan M. Smith:
Practical Problems with a Cryptographic Protection Scheme. CRYPTO 1989: 64-73 - Marijke De Soete, Jean-Jacques Quisquater, Klaus Vedder:
A Signature with Shared Verification Scheme. CRYPTO 1989: 253-262 - Makoto Tatebayashi, Natsume Matsuzaki, David B. Newman Jr.:
Key Distribution Protocol for Digital Mobile Communication Systems. CRYPTO 1989: 324-334 - Steve R. White:
Covert Distributed Processing with Computer Viruses. CRYPTO 1989: 616-619 - Yacov Yacobi, Zahava Shmuely:
On Key Distribution Systems. CRYPTO 1989: 344-355 - Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao:
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. CRYPTO 1989: 164-174