Sciweavers

CRYPTO
1990
Springer
58views Cryptology» more  CRYPTO 1990»
14 years 2 months ago
Structural Properties of One-way Hash Functions
We study the following two kinds of one-way hash functions: universal oneway hash functions (UOHs) and collision intractable hash functions (CIHs). The main property of the former...
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
CRYPTO
1990
Springer
62views Cryptology» more  CRYPTO 1990»
14 years 2 months ago
An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
CRYPTO
1990
Springer
69views Cryptology» more  CRYPTO 1990»
14 years 2 months ago
CORSAIR: A SMART Card for Public Key Cryptosystems
Dominique de Waleffe, Jean-Jacques Quisquater
CRYPTO
1990
Springer
78views Cryptology» more  CRYPTO 1990»
14 years 2 months ago
How to Time-Stamp a Digital Document
The prospect of a world in which all text, audio, picture, and video documents are in digital form on easily modi able media raises the issue of how to certify when a document was...
Stuart Haber, W. Scott Stornetta
CRYPTO
1990
Springer
79views Cryptology» more  CRYPTO 1990»
14 years 2 months ago
Fair Computation of General Functions in Presence of Immoral Majority
This paper describes a method for n players, a majority of which may be faulty, to compute correctly, privately, and fairly any computable function f(Xl, ...,x,) where xi is the i...
Shafi Goldwasser, Leonid A. Levin