Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of crypto 1986
Page
Title
3-8
Structure in the S-boxes of the DES
9-32
Cycle Structures of the DES with Weak and Semi-Weak Keys
35-48
Private-Key Algebraic-Coded Cryptosystems
49-59
Some Variations on RSA Signatures and Their Security
60-63
Breaking the Cade Cipher
64-83
A Modification of a Broken Public-Key Cipher
84-103
A Pseudo-Random Bit Generator Based on Elliptic Logarithms
104-110
Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme
111-117
Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?)
118-167
A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations
171-185
How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design
186-194
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
195-199
Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How
200-212
Demonstrating Possession of a Discrete Logarithm Without Revealing It
213-222
Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols
223-233
Zero-Knowledge Simulation of Boolean Circuits
234-238
All-or-Nothing Disclosure of Secrets
239-247
A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face
251-260
Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing
261-265
How to Share a Secret with Cheaters
266-274
Smallest Possible Message Expansion in Threshold Schemes
277-301
VLSI Implementation of Public-Key Encryption Algorithms
302-310
Architectures for Exponentiation in GF(2
^{n}
)
311-323
Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor
327-346
A High Speed Manipulation Detection Code
347-377
Electronic Funds Transfer Point of Sale in Australia
381-392
The Notion of Security for Probabilistic Cryptosystems
393-404
Large-Scale Randomization Techniques
405-417
On the Linear Span of binary Sequences Obtained from Finite Geometries
418-425
Some Constructions and Bounds for authentication Codes
426-439
Towards a Theory of Software Protection
443-450
Two Observations on Probabilistic Primality Testing
451-458
Public-Key Registration
459-463
Is There an ultimate Use of Cryptography?
464-479
Smart Card, a Highly Reliable and Portable Security Device
480-487
THOMAS - A Complete Single Chip RSA Device