Sciweavers

10 search results - page 2 / 2
» crypto 1989
Sort
View
CRYPTO
1989
Springer
82views Cryptology» more  CRYPTO 1989»
13 years 9 months ago
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
CRYPTO
1989
Springer
99views Cryptology» more  CRYPTO 1989»
13 years 9 months ago
How to Explain Zero-Knowledge Protocols to Your Children
Jean-Jacques Quisquater, Myriam Quisquater, Muriel...
CRYPTO
1989
Springer
163views Cryptology» more  CRYPTO 1989»
13 years 9 months ago
Undeniable Signatures
Abstract. In this paper, we provide a new approach to study undeniable signatures by translating secure digital signatures to secure undeniable signatures so that the existing algo...
David Chaum, Hans Van Antwerpen
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
13 years 9 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
CRYPTO
2011
Springer
179views Cryptology» more  CRYPTO 2011»
12 years 5 months ago
Smaller Decoding Exponents: Ball-Collision Decoding
Very few public-key cryptosystems are known that can encrypt and decrypt in time b2+o(1) with conjectured security level 2b against conventional computers and quantum computers. Th...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...