What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1986
Year
Venue
Title
1986
CRYPTO
A High Speed Manipulation Detection Code
Robert R. Jueneman
1986
CRYPTO
A Modification of a Broken Public-Key Cipher
John J. Cade
1986
CRYPTO
A Pseudo-Random Bit Generator Based on Elliptic Logarithms
Burton S. Kaliski Jr.
1986
CRYPTO
A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations
David Chaum
Jan-Hendrik Evertse
1986
CRYPTO
A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face
Claude Crépeau
1986
CRYPTO
Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings
1986
CRYPTO
All-or-Nothing Disclosure of Secrets
Gilles Brassard
Claude Crépeau
Jean-Marc Robert
1986
CRYPTO
Architectures for Exponentiation in GF(2<sup>n</sup>)
Thomas Beth
B. M. Cook
Dieter Gollmann
1986
CRYPTO
Breaking the Cade Cipher
N. S. James
Rudolf Lidl
Harald Niederreiter
1986
CRYPTO
Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols
Josh Cohen Benaloh
1986
CRYPTO
Cycle Structures of the DES with Weak and Semi-Weak Keys
Judy H. Moore
Gustavus J. Simmons
1986
CRYPTO
Demonstrating Possession of a Discrete Logarithm Without Revealing It
David Chaum
Jan-Hendrik Evertse
Jeroen van de Graaf
René Peralta
1986
CRYPTO
Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How
David Chaum
1986
CRYPTO
Electronic Funds Transfer Point of Sale in Australia
Ralph Gyoery
Jennifer Seberry
1986
CRYPTO
How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design
Oded Goldreich
Silvio Micali
Avi Wigderson
1986
CRYPTO
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
Amos Fiat
Adi Shamir
1986
CRYPTO
How to Share a Secret with Cheaters
Martin Tompa
Heather Woll
1986
CRYPTO
Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor
Paul Barrett
1986
CRYPTO
Is There an ultimate Use of Cryptography?
Yvo Desmedt
1986
CRYPTO
Large-Scale Randomization Techniques
Neal R. Wagner
Paul Putter
Marianne R. Cain
1986
CRYPTO
On the Linear Span of binary Sequences Obtained from Finite Geometries
Agnes Hui Chan
Richard A. Games
1986
CRYPTO
Private-Key Algebraic-Coded Cryptosystems
T. R. N. Rao
Kil-Hyun Nam
1986
CRYPTO
Public-Key Registration
Stephen M. Matyas
1986
CRYPTO
Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?)
Yvo Desmedt
Jean-Jacques Quisquater
1986
CRYPTO
Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing
Josh Cohen Benaloh
1986
CRYPTO
Smallest Possible Message Expansion in Threshold Schemes
G. R. Blakley
R. D. Dixon
1986
CRYPTO
Smart Card, a Highly Reliable and Portable Security Device
Louis C. Guillou
Michel Ugon
1986
CRYPTO
Some Constructions and Bounds for authentication Codes
Douglas R. Stinson
1986
CRYPTO
Some Variations on RSA Signatures and Their Security
Wiebren de Jonge
David Chaum
1986
CRYPTO
Structure in the S-boxes of the DES
Ernest F. Brickell
Judy H. Moore
M. R. Purtill
1986
CRYPTO
The Notion of Security for Probabilistic Cryptosystems
Silvio Micali
Charles Rackoff
Bob Sloan
1986
CRYPTO
THOMAS - A Complete Single Chip RSA Device
Gordon Rankine
1986
CRYPTO
Towards a Theory of Software Protection
Oded Goldreich
1986
CRYPTO
Two Observations on Probabilistic Primality Testing
Pierre Beauchemin
Gilles Brassard
Claude Crépeau
1986
CRYPTO
Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme
Oded Goldreich
1986
CRYPTO
VLSI Implementation of Public-Key Encryption Algorithms
Glenn A. Orton
M. P. Roy
P. A. Scott
Lloyd E. Peppard
Stafford E. Tavares
1986
CRYPTO
Zero-Knowledge Simulation of Boolean Circuits
Gilles Brassard
Claude Crépeau