What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1987
Year
Venue
Title
1987
CRYPTO
A Combinatorial Approach to Threshold Schemes
Douglas R. Stinson
Scott A. Vanstone
1987
CRYPTO
A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs
Douglas R. Stinson
1987
CRYPTO
A Crypto-Engine
George I. Davida
Frank B. Dancs
1987
CRYPTO
A Digital Signature Based on a Conventional Encryption Function
Ralph C. Merkle
1987
CRYPTO
A Generalization of Hellman's Extension of Shannon's Approach to Cryptography (Abstract)
Pierre Beauchemin
Gilles Brassard
1987
CRYPTO
A Natural Taxonomy for Digital Information Authentication Schemes
Gustavus J. Simmons
1987
CRYPTO
A Realization Scheme for the Identity-Based Cryptosystem
Hatsukazu Tanaka
1987
CRYPTO
A Simple and Secure Way to Show the Validity of Your Public Key
Jeroen van de Graaf
René Peralta
1987
CRYPTO
A Study of Password Security
Michael Luby
Charles Rackoff
1987
CRYPTO
A Video Scrambling Technique Based On Space Filling Curves
Yossi Matias
Adi Shamir
1987
CRYPTO
Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings
1987
CRYPTO
An Impersonation-Proof Identity Verfication Scheme
Gustavus J. Simmons
1987
CRYPTO
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes
Richard A. Kemmerer
1987
CRYPTO
Arbitration in Tamper Proof Systems
George I. Davida
Brian J. Matt
1987
CRYPTO
Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme
Yacov Yacobi
1987
CRYPTO
Components and Cycles of a Random Function
John M. DeLaurentis
1987
CRYPTO
Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model
Zvi Galil
Stuart Haber
Moti Yung
1987
CRYPTO
Cryptosystems Based on an Analog of Heat Flow
G. R. Blakley
William Rundell
1987
CRYPTO
Direct Minimum-Knowledge Computations
Russell Impagliazzo
Moti Yung
1987
CRYPTO
Efficient Digital Public-Key Signature with Shadow (Abstract)
Louis C. Guillou
Jean-Jacques Quisquater
1987
CRYPTO
Equivalence Between Two Flavours of Oblivious Transfers
Claude Crépeau
1987
CRYPTO
Fast Spectral Tests for Measuring Nonrandomness and the DES
Frank A. Feldman
1987
CRYPTO
Gradual and Verifiable Release of a Secret
Ernest F. Brickell
David Chaum
Ivan Damgård
Jeroen van de Graaf
1987
CRYPTO
How to Make Replicated Data Secure
Maurice Herlihy
J. D. Tygar
1987
CRYPTO
How to Solve any Protocol Problem - An Efficiency Improvement
Oded Goldreich
Ronen Vainish
1987
CRYPTO
Identity-based Conference Key Distribution Systems
Kenji Koyama
Kazuo Ohta
1987
CRYPTO
Integrating Cryptography in ISDN
Kåre Presttun
1987
CRYPTO
Key Distribution Systems Based on Identification Information
Eiji Okamoto
1987
CRYPTO
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result
David Chaum
Ivan Damgård
Jeroen van de Graaf
1987
CRYPTO
Multiparty Unconditionally Secure Protocols (Abstract)
David Chaum
Claude Crépeau
Ivan Damgård
1987
CRYPTO
Non-Interactive Zero-Knowledge Proof Systems
Alfredo De Santis
Silvio Micali
Giuseppe Persiano
1987
CRYPTO
On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme
T. R. N. Rao
1987
CRYPTO
On the F-function of FEAL
Walter Fumy
1987
CRYPTO
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
Tsutomu Matsumoto
Hideki Imai
1987
CRYPTO
Other Cycling Tests for DES (Abstract)
Jean-Jacques Quisquater
Jean-Paul Delescaille
1987
CRYPTO
Patterns of Entropy Drop of the Key in an S-Box of the DES
Kencheng Zeng
Jun-Hui Yang
Z. T. Dai
1987
CRYPTO
Secret Distribution of Keys for Public-Key Systems
Jean-Jacques Quisquater
1987
CRYPTO
Secure Audio Teleconference
Ernest F. Brickell
Pil Joong Lee
Yacov Yacobi
1987
CRYPTO
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem
Carlisle M. Adams
Henk Meijer
1987
CRYPTO
Society and Group Oriented Cryptography: A New Concept
Yvo Desmedt
1987
CRYPTO
Special Uses and Abuses of the Fiat-Shamir Passport Protocol
Yvo Desmedt
Claude Goutier
Samy Bengio
1987
CRYPTO
Standards for Data Security - A Change of Direction
Wyn L. Price
1987
CRYPTO
Strong Practical Protocols
Judy H. Moore
1987
CRYPTO
The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack
René Struik
Johan van Tilburg