What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1988
Year
Venue
Title
1988
CRYPTO
"Practical IP" <= MA
Gilles Brassard
Ivan Damgård
1988
CRYPTO
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge
Louis C. Guillou
Jean-Jacques Quisquater
1988
CRYPTO
A Basic Theory of Public and Private Cryptosystems
Charles Rackoff
1988
CRYPTO
A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers
Michael Lucks
1988
CRYPTO
A Family of Jacobians Suitable for Discrete Log Cryptosystems
Neal Koblitz
1988
CRYPTO
A Modification of the Fiat-Shamir Scheme
Kazuo Ohta
Tatsuaki Okamoto
1988
CRYPTO
A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm
Oded Goldreich
Eyal Kushilevitz
1988
CRYPTO
A Secure Audio Teleconference System
D. G. Steer
L. Strawczynski
Whitfield Diffie
Michael J. Wiener
1988
CRYPTO
A Universal Problem in Secure and Verifiable Distributed Computation
Ming-Deh A. Huang
Shang-Hua Teng
1988
CRYPTO
Abuses in Cryptography and How to Fight Them
Yvo Desmedt
1988
CRYPTO
Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings
1988
CRYPTO
An Abstract Theory of Computer Viruses
Leonard M. Adleman
1988
CRYPTO
An Improvement of the Fiat-Shamir Identification and Signature Scheme
Silvio Micali
Adi Shamir
1988
CRYPTO
Aperiodic Linear Complexities of de Bruijn Sequences
Richard T. C. Kwok
Maurice Beale
1988
CRYPTO
Bounds and Constructions for Authentication-Secrecy Codes with Splitting
Marijke De Soete
1988
CRYPTO
Computation of Approximate L-th Roots Modulo <i>n</i> and Application to Cryptography
Marc Girault
Philippe Toffin
Brigitte Vallée
1988
CRYPTO
Developing Ethernet Enhanced-Security System
B. J. Herbison
1988
CRYPTO
Diffie-Hillman is as Strong as Discrete Log for Certain Primes
Bert den Boer
1988
CRYPTO
Efficient, Perfect Random Number Generators
Silvio Micali
Claus-Peter Schnorr
1988
CRYPTO
Everything Provable is Provable in Zero-Knowledge
Michael Ben-Or
Oded Goldreich
Shafi Goldwasser
Johan Håstad
Joe Kilian
Silvio Micali
Phillip Rogaway
1988
CRYPTO
Generalized Secret Sharing and Monotone Functions
Josh Cohen Benaloh
Jerry Leichter
1988
CRYPTO
How to (Really) Share a Secret
Gustavus J. Simmons
1988
CRYPTO
How To Sign Given Any Trapdoor Function
Mihir Bellare
Silvio Micali
1988
CRYPTO
Intractable Problems in Number Theory
Eric Bach
1988
CRYPTO
Limits on the Provable Consequences of One-way Permutations
Russell Impagliazzo
Steven Rudich
1988
CRYPTO
Non-Interactive Zero-Knowledge with Preprocessing
Alfredo De Santis
Silvio Micali
Giuseppe Persiano
1988
CRYPTO
On Generating Solved Instances of Computational Problems
Martín Abadi
Eric Allender
Andrei Z. Broder
Joan Feigenbaum
Lane A. Hemachandra
1988
CRYPTO
On the Existence of Pseudorandom Generators
Oded Goldreich
Hugo Krawczyk
Michael Luby
1988
CRYPTO
On the Linear Syndrome Method in Cryptoanalysis
Kencheng Zeng
Minqiang Huang
1988
CRYPTO
On the McEliece Public-Key Cryptosystem
Johan van Tilburg
1988
CRYPTO
On the Power of 1-way Functions (Abstract)
Stuart A. Kurtz
Stephen R. Mahaney
James S. Royer
1988
CRYPTO
On the Randomness of Legendre and Jacobi Sequences
Ivan Damgård
1988
CRYPTO
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals
Ivan Damgård
1988
CRYPTO
Proving Security Against Chosen Cyphertext Attacks
Manuel Blum
Paul Feldman
Silvio Micali
1988
CRYPTO
Secret Error-Correcting Codes (SECC)
Tzonelih Hwang
T. R. N. Rao
1988
CRYPTO
Speeding Up Secret Computations with Insecure Auxiliary Devices
Tsutomu Matsumoto
Koki Kato
Hideki Imai
1988
CRYPTO
The Application of Smart Cards for RSA Digital Signatures in a Network Comprising both Interactive and Store-and-Foreward Facilities
J. R. Sherwood
V. A. Gallo
1988
CRYPTO
The Detection of Cheaters in Threshold Schemes
Ernest F. Brickell
Douglas R. Stinson
1988
CRYPTO
The Noisy Oracle Problem
Uriel Feige
Adi Shamir
Moshe Tennenholtz
1988
CRYPTO
The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition
Réjane Forré
1988
CRYPTO
Untraceable Electronic Cash
David Chaum
Amos Fiat
Moni Naor
1988
CRYPTO
Weakening Security Assumptions and Oblivious Transfer (Abstract)
Claude Crépeau
Joe Kilian
1988
CRYPTO
Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract)
Jørgen Brandt
Ivan Damgård
Peter Landrock
Torben P. Pedersen
1988
CRYPTO
Zero-Knowledge With Finite State Verifiers
Cynthia Dwork
Larry J. Stockmeyer