Search
International Association for Cryptologic Research
What's new
Archive
Paper awards
Videos
Authors
Coauthors
By year
By venue
All Committees
Most Committees
Report errors
About
List of Publications
year
venue
title
pages
1986
crypto
How to Share a Secret with Cheaters
261-265
1986
crypto
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
186-194
1986
crypto
Cycle Structures of the DES with Weak and Semi-Weak Keys
9-32
1986
crypto
Large-Scale Randomization Techniques
393-404
1986
crypto
On the Linear Span of binary Sequences Obtained from Finite Geometries
405-417
1986
crypto
Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme
104-110
1986
crypto
Towards a Theory of Software Protection
426-439
1986
crypto
How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design
171-185
1986
crypto
Public-Key Registration
451-458
1986
crypto
Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How
195-199
1986
crypto
Zero-Knowledge Simulation of Boolean Circuits
223-233
1986
crypto
Smart Card, a Highly Reliable and Portable Security Device
464-479
1986
crypto
A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations
118-167
1986
crypto
Electronic Funds Transfer Point of Sale in Australia
347-377
1986
crypto
All-or-Nothing Disclosure of Secrets
234-238
1986
crypto
Demonstrating Possession of a Discrete Logarithm Without Revealing It
200-212
1986
crypto
Structure in the S-boxes of the DES
3-8
1986
crypto
Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings
online
1986
crypto
VLSI Implementation of Public-Key Encryption Algorithms
277-301
1986
crypto
Smallest Possible Message Expansion in Threshold Schemes
266-274
1986
crypto
A Modification of a Broken Public-Key Cipher
64-83
1986
crypto
THOMAS - A Complete Single Chip RSA Device
480-487
1986
crypto
Private-Key Algebraic-Coded Cryptosystems
35-48
1986
crypto
Breaking the Cade Cipher
60-63
1986
crypto
A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face
239-247
1986
crypto
Some Variations on RSA Signatures and Their Security
49-59
1986
crypto
A High Speed Manipulation Detection Code
327-346
1986
crypto
A Pseudo-Random Bit Generator Based on Elliptic Logarithms
84-103
1986
crypto
Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols
213-222
1986
crypto
Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing
251-260
1986
crypto
Is There an ultimate Use of Cryptography?
459-463
1986
crypto
Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?)
111-117
1986
crypto
Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor
311-323
1986
crypto
Two Observations on Probabilistic Primality Testing
443-450
1986
crypto
The Notion of Security for Probabilistic Cryptosystems
381-392
1986
crypto
Architectures for Exponentiation in GF(2
n
)
302-310
1986
crypto
Some Constructions and Bounds for authentication Codes
418-425
1986
eurocrypt
Properties of De Bruijn Sequences Generated by a Cross-Join Technique
45
1986
eurocrypt
On Commutative Semigroups of Polynomials and their Application in Cryptography
50
1986
eurocrypt
Some Properties of Sequences Generated by a Windmill Machine
37
1986
eurocrypt
Tactical Configurations and Threshold Schemes
47
1986
eurocrypt
The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles
35-36
1986
eurocrypt
Could the Smart Card Be Dumb
8
1986
eurocrypt
Controlling Individual Information in Statistics by Coding
49
1986
eurocrypt
Cryptanalysis of the Yagisawa Public Key Cryptosystem
21-22
1986
eurocrypt
Linear Complexity of Sequences with Period p
n
33
1986
eurocrypt
Public Key Encryption of Stream Ciphers
53-54
1986
eurocrypt
Additional Properties in the S-Boxes of the DES
20
1986
eurocrypt
On Some Properties of the Sum of Two Pseudorandom Sequences
40-41
1986
eurocrypt
A Simple an Fast Probabilistic Algorithm for Computing Square Roots Modulo a Prime Number
15
1986
eurocrypt
On the Walsh-Fourier Analysis of Correlation-Immune Switching Functions
43-44
1986
eurocrypt
Some Preliminary Remarks on the Decimal, Shift an Add-Algorithm (DSA)
3
1986
eurocrypt
The Need for a Standarized Compression Algorithm for Digital Signatures
7
1986
eurocrypt
On Linear Shift Registers with Permuted Feedback
38-39
1986
eurocrypt
Perfect Authentication Systems for Data Sources with Arbitrary Statistics
1-2
1986
eurocrypt
Analyzing Encryption Protocols Using Formal Verification Techniques
48
1986
eurocrypt
Encryption Exponent 3 and the Security of RSA
55
1986
eurocrypt
A Cryptanalytic Attack on the CADE Cryptosystem
27
1986
eurocrypt
The NPL Intelligent Token and its Application
10-13
1986
eurocrypt
Elementary Proof of Rueppel's Linear Complexity Conjecture
34
1986
eurocrypt
Protection Against Active Eavesdropping
4-6
1986
eurocrypt
Another Look at Redundancy in Cryptographic Systems
29
1986
eurocrypt
Multilevel Cryptosecure Relational Database
50
1986
eurocrypt
Products of Linear Recurring Sequence with Maximum Complexity
30-32
1986
eurocrypt
Correlation-Immune Polynomials over Finite Fields
42
1986
eurocrypt
Several Exhaustive Key Search Machines and DES
17-19
1986
eurocrypt
Activities of IFIP Working Group 11: 4 on Crypto Management
14
1986
eurocrypt
Geometric Structures as Threshold Schemes
46
1986
eurocrypt
Sharma-Mittal Entropy and Shannon's Random Cipher Result
28
1986
eurocrypt
Cycle Structure of the Weak and Semi-Weak DES Keys
16
1986
eurocrypt
Cryptanalysis of Pseudo-Random Number Sequences Generated by a Linear Recurrence of a Given Order
23-26