What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1991
Year
Venue
Title
1991
CRYPTO
A Calculus for Access Control in Distributed Systems
★
Invited paper
Martín Abadi
Michael Burrows
Butler W. Lampson
Gordon D. Plotkin
1991
CRYPTO
A Cryptographic Scheme for Computerized Elections
Kenneth R. Iversen
1991
CRYPTO
A Known Plaintext Attack of FEAL-4 and FEAL-6
Anne Tardy-Corfdir
Henri Gilbert
1991
CRYPTO
A New ID-Based Key Sharing System
Shigeo Tsujii
Jinhui Chao
1991
CRYPTO
A One-Round, Two-Prover, Zero-Knowledge Protocol for NP
Dror Lapidot
Adi Shamir
1991
CRYPTO
A Switching Closure Test to Analyze Cryptosystems
Hikaru Morita
Kazuo Ohta
Shoji Miyaguchi
1991
CRYPTO
Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings
1991
CRYPTO
An Attack on the Last Two Rounds of MD4
Bert den Boer
Antoon Bosselaers
1991
CRYPTO
CM-Curves with Good Cryptographic Properties
Neal Koblitz
1991
CRYPTO
Combinatorial Characterizations of Authentication Codes
Douglas R. Stinson
1991
CRYPTO
Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer
David Chaum
Eugène van Heijst
Birgit Pfitzmann
1991
CRYPTO
Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract)
Marie-Jeanne Toussaint
1991
CRYPTO
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer
Eli Biham
Adi Shamir
1991
CRYPTO
Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems
Tatsuaki Okamoto
Kouichi Sakurai
1991
CRYPTO
Efficient Multiparty Protocols Using Circuit Randomization
Donald Beaver
1991
CRYPTO
Epidemiological Models of Computer Viruses
★
Invited talk
Jeff Kephart
Steve R. White
1991
CRYPTO
Exploiting Parallelism in Hardware Implementations of the DES
Albert G. Broscius
Jonathan M. Smith
1991
CRYPTO
Faster Modular Multiplication by Operand Scaling
Colin D. Walter
1991
CRYPTO
Foundations of Secure Interactive Computing
Donald Beaver
1991
CRYPTO
Functional Inversion and Communication Complexity
Shang-Hua Teng
1991
CRYPTO
How To Break and Repair A "Provably Secure" Untraceable Payment System
Birgit Pfitzmann
Michael Waidner
1991
CRYPTO
Interactive Proofs with Space Bounded Provers
Joe Kilian
Ronitt Rubinfeld
1991
CRYPTO
Multiparty Secret Key Exchange Using a Random Deal of Cards
Michael J. Fischer
Rebecca N. Wright
1991
CRYPTO
New Public-Key Schemes Based on Elliptic Curves over the Ring Z<sub>n</sub>
Kenji Koyama
Ueli Maurer
Tatsuaki Okamoto
Scott A. Vanstone
1991
CRYPTO
New Results on Pseudorandom Permutation Generators Based on the DES Scheme
Jacques Patarin
1991
CRYPTO
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
Torben P. Pedersen
1991
CRYPTO
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
Charles Rackoff
Daniel R. Simon
1991
CRYPTO
On Correlation-Immune Functions
Paul Camion
Claude Carlet
Pascale Charpin
Nicolas Sendrier
1991
CRYPTO
On the Size of Shares for Secret Sharing Schemes
Renato M. Capocelli
Alfredo De Santis
Luisa Gargano
Ugo Vaccaro
1991
CRYPTO
On Verification in Secret Sharing
Cynthia Dwork
1991
CRYPTO
Practical Quantum Oblivious Transfer
Charles H. Bennett
Gilles Brassard
Claude Crépeau
Marie-Hélène Skubiszewska
1991
CRYPTO
Pseudo-random Generators from One-way Functions (Abstract)
★
Invited paper
Michael Luby
1991
CRYPTO
Secure Computation (Abstract)
Silvio Micali
Phillip Rogaway
1991
CRYPTO
Shared Generation of Authenticators and Signatures (Extended Abstract)
Yvo Desmedt
Yair Frankel
1991
CRYPTO
Systematic Design of Two-Party Authentication Protocols
Ray Bird
Inder S. Gopal
Amir Herzberg
Philippe A. Janson
Shay Kutten
Refik Molva
Moti Yung
1991
CRYPTO
The Cryptoanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks
Yeow Meng Chee
Antoine Joux
Jacques Stern
1991
CRYPTO
The Use of Interaction in Public Cryptosystems (Extended Abstract)
Steven Rudich
1991
CRYPTO
Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks
Ivan Damgård
1991
CRYPTO
Universal Electronic Cash
Tatsuaki Okamoto
Kazuo Ohta
1991
CRYPTO
Universal Hashing and Authentication Codes
Douglas R. Stinson