Cryptographers' World
 

CRYPTO 1991


[Sort by page number] [Sort by citations count]

 
Joan Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings. Springer, 1992. ISBN 3-540-55188-3.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



MartĂ­n Abadi,  Michael Burrows,  Butler W. Lampson,  Gordon D. Plotkin,  A Calculus for Access Control in Distributed Systems, pp. 1 - 23, CRYPTO 1991.

[Electronic Edition][Cited 620 times Red StarRed StarRed StarRed Star]

Marie-Jeanne Toussaint,  Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract), pp. 24 - 43, CRYPTO 1991.

[Electronic Edition][Cited 16 times ]

Ray Bird,  Inder S. Gopal,  Amir Herzberg,  Philippe A. Janson,  Shay Kutten,  Refik Molva,  Moti Yung,  Systematic Design of Two-Party Authentication Protocols, pp. 44 - 61, CRYPTO 1991.

[Electronic Edition][Cited 150 times Red StarRed Star]

Douglas R. Stinson,  Combinatorial Characterizations of Authentication Codes, pp. 62 - 73, CRYPTO 1991.

[Electronic Edition][Cited 66 times Red Star]

Douglas R. Stinson,  Universal Hashing and Authentication Codes, pp. 74 - 85, CRYPTO 1991.

[Electronic Edition][Cited 205 times Red StarRed Star]

Paul Camion,  Claude Carlet,  Pascale Charpin,  Nicolas Sendrier,  On Correlation-Immune Functions, pp. 86 - 100, CRYPTO 1991.

[Electronic Edition][Cited 181 times Red StarRed Star]

Renato M. Capocelli,  Alfredo De Santis,  Luisa Gargano,  Ugo Vaccaro,  On the Size of Shares for Secret Sharing Schemes, pp. 101 - 113, CRYPTO 1991.

[Electronic Edition][Cited 184 times Red StarRed Star]

Cynthia Dwork,  On Verification in Secret Sharing, pp. 114 - 128, CRYPTO 1991.

[Electronic Edition][Cited 5 times ]

Torben P. Pedersen,  Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, pp. 129 - 140, CRYPTO 1991.

[Electronic Edition][Cited 877 times Red StarRed StarRed StarRed Star]

Michael J. Fischer,  Rebecca N. Wright,  Multiparty Secret Key Exchange Using a Random Deal of Cards, pp. 141 - 155, CRYPTO 1991.

[Electronic Edition][Cited 40 times ]

Eli Biham,  Adi Shamir,  Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer, pp. 156 - 171, CRYPTO 1991.

[Electronic Edition][Cited 101 times Red StarRed Star]

Anne Tardy-Corfdir,  Henri Gilbert,  A Known Plaintext Attack of FEAL-4 and FEAL-6, pp. 172 - 181, CRYPTO 1991.

[Electronic Edition][Cited 47 times ]

Hikaru Morita,  Kazuo Ohta,  Shoji Miyaguchi,  A Switching Closure Test to Analyze Cryptosystems, pp. 183 - 193, CRYPTO 1991.

[Electronic Edition][Cited 10 times ]

Bert den Boer,  Antoon Bosselaers,  An Attack on the Last Two Rounds of MD4, pp. 194 - 203, CRYPTO 1991.

[Electronic Edition][Cited 107 times Red StarRed Star]

Yeow Meng Chee,  Antoine Joux,  Jacques Stern,  The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks, pp. 204 - 212, CRYPTO 1991.

[Electronic Edition][Cited 13 times ]

Dror Lapidot,  Adi Shamir,  A One-Round, Two-Prover, Zero-Knowledge Protocol for NP, pp. 213 - 224, CRYPTO 1991.

[Electronic Edition][Cited 20 times ]

Joe Kilian,  Ronitt Rubinfeld,  Interactive Proofs with Space Bounded Provers, pp. 225 - 231, CRYPTO 1991.

[Electronic Edition][No citation]

Shang-Hua Teng,  Functional Inversion and Communication Complexity, pp. 232 - 241, CRYPTO 1991.

[Electronic Edition][Cited 1 times ]

Steven Rudich,  The Use of Interaction in Public Cryptosystems (Extended Abstract), pp. 242 - 251, CRYPTO 1991.

[Electronic Edition][Cited 30 times ]

Kenji Koyama,  Ueli M. Maurer,  Tatsuaki Okamoto,  Scott A. Vanstone,  New Public-Key Schemes Based on Elliptic Curves over the Ring Z, pp. 252 - 266, CRYPTO 1991.

[Electronic Edition][Cited 145 times Red StarRed Star]

Tatsuaki Okamoto,  Kouichi Sakurai,  Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems, pp. 267 - 278, CRYPTO 1991.

[Electronic Edition][Cited 8 times ]

Neal Koblitz,  CM-Curves with Good Cryptographic Properties, pp. 279 - 287, CRYPTO 1991.

[Electronic Edition][Cited 306 times Red StarRed StarRed Star]

Shigeo Tsujii,  Jinhui Chao,  A New ID-Based Key Sharing System, pp. 288 - 299, CRYPTO 1991.

[Electronic Edition][Cited 15 times ]

Michael Luby,  Pseudo-random Generators from One-way Functions (Abstract), pp. 300 - 300, CRYPTO 1991.

[Electronic Edition][No citation]

Jacques Patarin,  New Results on Pseudorandom Permutation Generators Based on the DES Scheme, pp. 301 - 312, CRYPTO 1991.

[Electronic Edition][Cited 45 times ]

Colin D. Walter,  Faster Modular Multiplication by Operand Scaling, pp. 313 - 323, CRYPTO 1991.

[Electronic Edition][Cited 52 times Red Star]

Tatsuaki Okamoto,  Kazuo Ohta,  Universal Electronic Cash, pp. 324 - 337, CRYPTO 1991.

[Electronic Edition][Cited 303 times Red StarRed StarRed Star]

Birgit Pfitzmann,  Michael Waidner,  How To Break and Repair A "Provably Secure" Untraceable Payment System, pp. 338 - 350, CRYPTO 1991.

[Electronic Edition][Cited 49 times ]

Charles H. Bennett,  Gilles Brassard,  Claude CrĂ©peau,  Marie-HĂ©lène Skubiszewska,  Practical Quantum Oblivious Transfer, pp. 351 - 366, CRYPTO 1991.

[Electronic Edition][Cited 120 times Red StarRed Star]

Albert G. Broscius,  Jonathan M. Smith,  Exploiting Parallelism in Hardware Implementations of the DES, pp. 367 - 376, CRYPTO 1991.

[Electronic Edition][Cited 37 times ]

Donald Beaver,  Foundations of Secure Interactive Computing, pp. 377 - 391, CRYPTO 1991.

[Electronic Edition][Cited 213 times Red StarRed Star]

Silvio Micali,  Phillip Rogaway,  Secure Computation (Abstract), pp. 392 - 404, CRYPTO 1991.

[Electronic Edition][Cited 304 times Red StarRed StarRed Star]

Kenneth R. Iversen,  A Cryptographic Scheme for Computerized Elections, pp. 405 - 419, CRYPTO 1991.

[Electronic Edition][Cited 11 times ]

Donald Beaver,  Efficient Multiparty Protocols Using Circuit Randomization, pp. 420 - 432, CRYPTO 1991.

[Electronic Edition][Cited 58 times Red Star]

Charles Rackoff,  Daniel R. Simon,  Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, pp. 433 - 444, CRYPTO 1991.

[Electronic Edition][Cited 669 times Red StarRed StarRed StarRed Star]

Ivan Damgard,  Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks, pp. 445 - 456, CRYPTO 1991.

[Electronic Edition][Cited 117 times Red StarRed Star]

Yvo Desmedt,  Yair Frankel,  Shared Generation of Authenticators and Signatures (Extended Abstract), pp. 457 - 469, CRYPTO 1991.

[Electronic Edition][Cited 437 times Red StarRed StarRed Star]

David Chaum,  Eugène van Heijst,  Birgit Pfitzmann,  Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer, pp. 470 - 484, CRYPTO 1991.

[Electronic Edition][Cited 151 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...