Sciweavers

CRYPTO
1990
Springer
79views Cryptology» more  CRYPTO 1990»
14 years 3 months ago
Fair Computation of General Functions in Presence of Immoral Majority
This paper describes a method for n players, a majority of which may be faulty, to compute correctly, privately, and fairly any computable function f(Xl, ...,x,) where xi is the i...
Shafi Goldwasser, Leonid A. Levin
CRYPTO
1989
Springer
82views Cryptology» more  CRYPTO 1989»
14 years 3 months ago
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 3 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
CRYPTO
1989
Springer
99views Cryptology» more  CRYPTO 1989»
14 years 3 months ago
How to Explain Zero-Knowledge Protocols to Your Children
Jean-Jacques Quisquater, Myriam Quisquater, Muriel...
CRYPTO
1989
Springer
148views Cryptology» more  CRYPTO 1989»
14 years 3 months ago
A Certified Digital Signature
Ralph C. Merkle
CRYPTO
1989
Springer
90views Cryptology» more  CRYPTO 1989»
14 years 3 months ago
UNIX Password Security - Ten Years Later
David C. Feldmeier, Philip R. Karn
CRYPTO
1989
Springer
163views Cryptology» more  CRYPTO 1989»
14 years 3 months ago
Undeniable Signatures
Abstract. In this paper, we provide a new approach to study undeniable signatures by translating secure digital signatures to secure undeniable signatures so that the existing algo...
David Chaum, Hans Van Antwerpen
CRYPTO
1989
Springer
80views Cryptology» more  CRYPTO 1989»
14 years 3 months ago
Addition Chain Heuristics
Jurjen N. Bos, Matthijs J. Coster
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 3 months ago
Efficient Identification Schemes Using Two Prover Interactive Proofs
Michael Ben-Or, Shafi Goldwasser, Joe Kilian, Avi ...
ASIACRYPT
1990
Springer
14 years 3 months ago
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
Lawrence Brown, Josef Pieprzyk, Jennifer Seberry