Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings
Page
Title
2-5
Keying the German Navy's Enigma
6-16
Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context
17-27
On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs
30-34
Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks
35-43
The use of Encryption in Kerberos for Network Authentication
44-63
UNIX Password Security - Ten Years Later
64-73
Practical Problems with a Cryptographic Protection Scheme
74-79
The Smart Siskette - A Universal User Token and Personal Crypto-Engine
82-89
On the Quadratic Spans of Periodic Sequences
90-99
The Shortest Feedback Shift Register That Can Generate A Given Sequence
100-112
Perfect Local Randomness in Pseudo-Random Sequences
113-127
Sparse Pseudorandom Distributions
128-136
Bit Commitment Using Pseudo-Randomness
138-153
How to Predict Congruential Generators
154-163
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang
164-174
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications
175-185
Batch RSA
186-192
On the Implementation of Elliptic Curve Cryptosystems
194-211
New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs
212-216
Undeniable Signatures
218-238
A Certified Digital Signature
239-252
Efficient Identification and Signatures for Smart Cards
253-262
A Signature with Shared Verification Scheme
263-275
On-Line/Off-Line Digital Schemes
278-285
On the Classification of Idea Secret Sharing Schemes
286-298
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space
299-306
Secret Sharing Over Infinite Domains (Extended Abstract)
307-315
Threshold Cryptosystems
316-322
Flexible Access Control with Master Keys
324-334
Key Distribution Protocol for Digital Mobile Communication Systems
335-343
A Key Exchange System Based on Real Quadratic Fields
344-355
On Key Distribution Systems
356-366
SDNS Architecture and End-to-End Encryption
368-370
A Survey of Hardware Implementation of RSA (Abstract)
371-386
Modular Exponentiation Using Recursive Sums of Residues
387-399
A Fast Modular-multiplication Algorithm based on a Higher Radix
400-407
Addition Chain Heuristics
408-413
How Easy is Collision Search. New Results and Applications to DES
416-427
A Design Principle for Hash Functions
428-446
One Way Hash Functions and DES
447-460
Properties of Cryptosystem PGM
461-480
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
481-496
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash
498-506
Efficient Identification Schemes Using Two Prover Interactive Proofs
507-525
On the Concrete Complexity of Zero-Knowledge Proofs
526-544
Zero Knowledge Proofs of Knowledge in Two Rounds
545-546
Minimum Resource Zero-Knowledge Proofs (Extended Abstract)
547-557
Non-Interactive Oblivious Transfer and Spplications
560-572
Multiparty Protocols Tolerating Half Faulty Processors
573-588
Controlled Gradual Disclosure Schemes for Random Bits and Their Applications
589-590
Multiparty Computation with Faulty Majority
591-602
The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities
604-605
On the Structure of Secret Key Exchange Protocols
606-609
An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract)
610-611
An Efficient Software Protection Scheme
612-615
Good S-Boxes Are Easy To Find
616-619
Covert Distributed Processing with Computer Viruses
620-623
Progress in Data Security Standardization
624-627
The FEAL-8 Cryptosystem and a Call for Attack
628-631
How to Explain Zero-Knowledge Protocols to Your Children