Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
7
search results - page 1 / 2
»
crypto 1991
Sort
relevance
views
votes
recent
update
View
thumb
title
12
click to vote
CRYPTO
1991
Springer
103
views
Cryptology
»
more
CRYPTO 1991
»
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
13 years 9 months ago
Download
www.cs.huji.ac.il
Torben P. Pedersen
claim paper
Read More »
17
click to vote
CRYPTO
1991
Springer
98
views
Cryptology
»
more
CRYPTO 1991
»
A Calculus for Access Control in Distributed Systems
13 years 9 months ago
Download
homepages.inf.ed.ac.uk
Martín Abadi, Michael Burrows, Butler W. La...
claim paper
Read More »
16
click to vote
CRYPTO
1991
Springer
87
views
Cryptology
»
more
CRYPTO 1991
»
Practical Quantum Oblivious Transfer
13 years 9 months ago
Download
crypto.cs.mcgill.ca
Charles H. Bennett, Gilles Brassard, Claude Cr&eac...
claim paper
Read More »
14
click to vote
ASIACRYPT
1991
Springer
101
views
Cryptology
»
more
ASIACRYPT 1991
»
Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91
13 years 9 months ago
Download
www.cosic.esat.kuleuven.be
A method is described to generate collisions for the hash function FFT-Hash that
Joan Daemen, Antoon Bosselaers, René Govaer...
claim paper
Read More »
15
click to vote
CRYPTO
1991
Springer
105
views
Cryptology
»
more
CRYPTO 1991
»
Universal Hashing and Authentication Codes
13 years 9 months ago
Download
www1.spms.ntu.edu.sg
In this paper, we study the application of universal hashingto the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the nu...
Douglas R. Stinson
claim paper
Read More »
« Prev
« First
page 1 / 2
Last »
Next »