Sciweavers

CRYPTO
1990
Springer
79views Cryptology» more  CRYPTO 1990»
14 years 20 days ago
Fair Computation of General Functions in Presence of Immoral Majority
This paper describes a method for n players, a majority of which may be faulty, to compute correctly, privately, and fairly any computable function f(Xl, ...,x,) where xi is the i...
Shafi Goldwasser, Leonid A. Levin
CRYPTO
1989
Springer
82views Cryptology» more  CRYPTO 1989»
14 years 20 days ago
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 20 days ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
CRYPTO
1989
Springer
99views Cryptology» more  CRYPTO 1989»
14 years 20 days ago
How to Explain Zero-Knowledge Protocols to Your Children
Jean-Jacques Quisquater, Myriam Quisquater, Muriel...
CRYPTO
1989
Springer
148views Cryptology» more  CRYPTO 1989»
14 years 20 days ago
A Certified Digital Signature
Ralph C. Merkle
CRYPTO
1989
Springer
90views Cryptology» more  CRYPTO 1989»
14 years 20 days ago
UNIX Password Security - Ten Years Later
David C. Feldmeier, Philip R. Karn
CRYPTO
1989
Springer
163views Cryptology» more  CRYPTO 1989»
14 years 20 days ago
Undeniable Signatures
Abstract. In this paper, we provide a new approach to study undeniable signatures by translating secure digital signatures to secure undeniable signatures so that the existing algo...
David Chaum, Hans Van Antwerpen
CRYPTO
1989
Springer
80views Cryptology» more  CRYPTO 1989»
14 years 20 days ago
Addition Chain Heuristics
Jurjen N. Bos, Matthijs J. Coster
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 20 days ago
Efficient Identification Schemes Using Two Prover Interactive Proofs
Michael Ben-Or, Shafi Goldwasser, Joe Kilian, Avi ...
ASIACRYPT
1990
Springer
14 years 20 days ago
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
Lawrence Brown, Josef Pieprzyk, Jennifer Seberry