Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of crypto 1987
Page
Title
3-8
Standards for Data Security - A Change of Direction
9-18
Integrating Cryptography in ISDN
21-39
Special Uses and Abuses of the Fiat-Shamir Passport Protocol
40-51
Direct Minimum-Knowledge Computations
52-72
Non-Interactive Zero-Knowledge Proof Systems
73-86
How to Solve any Protocol Problem - An Efficiency Improvement
87-119
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result
120-127
Society and Group Oriented Cryptography: A New Concept
128-134
A Simple and Secure Way to Show the Validity of Your Public Key
135-155
Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model
156-166
Gradual and Verifiable Release of a Secret
167-172
Strong Practical Protocols
175-184
Identity-based Conference Key Distribution Systems
185-193
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
194-202
Key Distribution Systems Based on Identification Information
203-208
Secret Distribution of Keys for Public-Key Systems
211-215
An Impersonation-Proof Identity Verfication Scheme
216-222
Arbitration in Tamper Proof Systems
223
Efficient Digital Public-Key Signature with Shadow (Abstract)
224-228
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem
231-242
Components and Cycles of a Random Function
243-254
Fast Spectral Tests for Measuring Nonrandomness and the DES
255-256
Other Cycling Tests for DES (Abstract)
257-268
A Crypto-Engine
269-288
A Natural Taxonomy for Digital Information Authentication Schemes
289-305
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes
306-329
Cryptosystems Based on an Analog of Heat Flow
330-339
A Combinatorial Approach to Threshold Schemes
340-349
A Realization Scheme for the Identity-Based Cryptosystem
350-354
Equivalence Between Two Flavours of Oblivious Transfers
355-366
A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs
369-378
A Digital Signature Based on a Conventional Encryption Function
379-391
How to Make Replicated Data Secure
392-397
A Study of Password Security
398-417
A Video Scrambling Technique Based On Space Filling Curves
418-426
Secure Audio Teleconference
429-433
Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme
434-437
On the F-function of FEAL
438-444
Patterns of Entropy Drop of the Key in an S-Box of the DES
445-457
The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack
458-460
On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme
461
A Generalization of Hellman's Extension of Shannon's Approach to Cryptography (Abstract)
462
Multiparty Unconditionally Secure Protocols (Abstract)