Sciweavers

CRYPTO
1989
Springer
70views Cryptology» more  CRYPTO 1989»
14 years 2 months ago
One Way Hash Functions and DES
Ralph C. Merkle
CRYPTO
1989
Springer
82views Cryptology» more  CRYPTO 1989»
14 years 2 months ago
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 2 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
CRYPTO
1989
Springer
99views Cryptology» more  CRYPTO 1989»
14 years 2 months ago
How to Explain Zero-Knowledge Protocols to Your Children
Jean-Jacques Quisquater, Myriam Quisquater, Muriel...
CRYPTO
1989
Springer
148views Cryptology» more  CRYPTO 1989»
14 years 2 months ago
A Certified Digital Signature
Ralph C. Merkle
CRYPTO
1989
Springer
90views Cryptology» more  CRYPTO 1989»
14 years 2 months ago
UNIX Password Security - Ten Years Later
David C. Feldmeier, Philip R. Karn
CRYPTO
1989
Springer
163views Cryptology» more  CRYPTO 1989»
14 years 2 months ago
Undeniable Signatures
Abstract. In this paper, we provide a new approach to study undeniable signatures by translating secure digital signatures to secure undeniable signatures so that the existing algo...
David Chaum, Hans Van Antwerpen
CRYPTO
1989
Springer
80views Cryptology» more  CRYPTO 1989»
14 years 2 months ago
Addition Chain Heuristics
Jurjen N. Bos, Matthijs J. Coster
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 2 months ago
Efficient Identification Schemes Using Two Prover Interactive Proofs
Michael Ben-Or, Shafi Goldwasser, Joe Kilian, Avi ...