year |
venue |
title |
pages |
1987 | crypto | Fast Spectral Tests for Measuring Nonrandomness and the DES | 243-254 |
1987 | crypto | Strong Practical Protocols | 167-172 |
1987 | crypto | On the F-function of FEAL | 434-437 |
1987 | crypto | Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model | 135-155 |
1987 | crypto | A Study of Password Security | 392-397 |
1987 | crypto | Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme | 429-433 |
1987 | crypto | Patterns of Entropy Drop of the Key in an S-Box of the DES | 438-444 |
1987 | crypto | A Video Scrambling Technique Based On Space Filling Curves | 398-417 |
1987 | crypto | On the Key Predistribution System: A Practical Solution to the Key Distribution Problem | 185-193 |
1987 | crypto | How to Solve any Protocol Problem - An Efficiency Improvement | 73-86 |
1987 | crypto | Key Distribution Systems Based on Identification Information | 194-202 |
1987 | crypto | Multiparty Unconditionally Secure Protocols (Abstract) | 462 |
1987 | crypto | A Simple and Secure Way to Show the Validity of Your Public Key | 128-134 |
1987 | crypto | Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result | 87-119 |
1987 | crypto | Efficient Digital Public-Key Signature with Shadow (Abstract) | 223 |
1987 | crypto | A Digital Signature Based on a Conventional Encryption Function | 369-378 |
1987 | crypto | Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings | online |
1987 | crypto | Gradual and Verifiable Release of a Secret | 156-166 |
1987 | crypto | How to Make Replicated Data Secure | 379-391 |
1987 | crypto | Secure Audio Teleconference | 418-426 |
1987 | crypto | Cryptosystems Based on an Analog of Heat Flow | 306-329 |
1987 | crypto | On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme | 458-460 |
1987 | crypto | Analyzing Encryption Protocols Using Formal Verification Authentication Schemes | 289-305 |
1987 | crypto | Integrating Cryptography in ISDN | 9-18 |
1987 | crypto | Direct Minimum-Knowledge Computations | 40-51 |
1987 | crypto | Standards for Data Security - A Change of Direction | 3-8 |
1987 | crypto | Secret Distribution of Keys for Public-Key Systems | 203-208 |
1987 | crypto | Other Cycling Tests for DES (Abstract) | 255-256 |
1987 | crypto | Security-Related Comments Regarding McEliece's Public-Key Cryptosystem | 224-228 |
1987 | crypto | Equivalence Between Two Flavours of Oblivious Transfers | 350-354 |
1987 | crypto | Non-Interactive Zero-Knowledge Proof Systems | 52-72 |
1987 | crypto | A Crypto-Engine | 257-268 |
1987 | crypto | Arbitration in Tamper Proof Systems | 216-222 |
1987 | crypto | Identity-based Conference Key Distribution Systems | 175-184 |
1987 | crypto | Components and Cycles of a Random Function | 231-242 |
1987 | crypto | Society and Group Oriented Cryptography: A New Concept | 120-127 |
1987 | crypto | An Impersonation-Proof Identity Verfication Scheme | 211-215 |
1987 | crypto | A Natural Taxonomy for Digital Information Authentication Schemes | 269-288 |
1987 | crypto | Special Uses and Abuses of the Fiat-Shamir Passport Protocol | 21-39 |
1987 | crypto | A Generalization of Hellman's Extension of Shannon's Approach to Cryptography (Abstract) | 461 |
1987 | crypto | A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs | 355-366 |
1987 | crypto | A Combinatorial Approach to Threshold Schemes | 330-339 |
1987 | crypto | The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack | 445-457 |
1987 | crypto | A Realization Scheme for the Identity-Based Cryptosystem | 340-349 |
1987 | eurocrypt | IC-Cards in High-Security Applications | 177-199 |
1987 | eurocrypt | Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators | 25-35 |
1987 | eurocrypt | Message Authentication and Dynamic Passwords | 171-175 |
1987 | eurocrypt | Linear Structures in Blockciphers | 249-266 |
1987 | eurocrypt | Security Considerations in the Design and Implementation of a new DES chip | 287-300 |
1987 | eurocrypt | Hash-Functions Using Modulo-N Operations | 217-226 |
1987 | eurocrypt | In Memoriam Tore Herlestam (1929 - 1986) | 3-4 |
1987 | eurocrypt | Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers | 237-247 |
1987 | eurocrypt | Sequences With Almost Perfect Linear Complexity Profile | 37-51 |
1987 | eurocrypt | Blinding for Unanticipated Signatures | 227-233 |
1987 | eurocrypt | An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations | 127-141 |
1987 | eurocrypt | On Privacy Homomorphisms (Extended Abstract) | 117-125 |
1987 | eurocrypt | Modes of Blockcipher Algorithms and their Protection Against Active Eavesdropping | 281-286 |
1987 | eurocrypt | Physical Protection of Cryptographic Devices | 83-93 |
1987 | eurocrypt | Alternating Step Generators Controlled by De Bruijn Sequences | 5-14 |
1987 | eurocrypt | Extension of Brickell's Algorithm for Breaking High Density Knapsacks | 109-115 |
1987 | eurocrypt | Finite State Machine Modelling of Cryptographic Systems in Loops | 65-73 |
1987 | eurocrypt | Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings | online |
1987 | eurocrypt | The RSA Cryptography Processor | 95-105 |
1987 | eurocrypt | Collision Free Hash Functions and Public Key Signature Schemes | 203-216 |
1987 | eurocrypt | Fast Data Encipherment Algorithm FEAL | 267-278 |
1987 | eurocrypt | Random Sources for Cryptographic Systems | 77-81 |
1987 | eurocrypt | A Public Key Analog Cryptosystem | 143-147 |
1987 | eurocrypt | When Shift Registers Clock Themselves | 53-64 |
1987 | eurocrypt | Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution | 15-23 |
1987 | eurocrypt | High-Performance Interface Architectures for Cryptographic Hardware | 301-309 |
1987 | eurocrypt | Perfect and Essentially Perfect Authentication Schemes | 167-170 |
1987 | eurocrypt | Message Authentication with Arbitration of Transmitter/Receiver Disputes | 151-165 |