Sciweavers

CRYPTO
1991
Springer
105views Cryptology» more  CRYPTO 1991»
13 years 8 months ago
Universal Hashing and Authentication Codes
In this paper, we study the application of universal hashingto the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the nu...
Douglas R. Stinson
CRYPTO
1991
Springer
150views Cryptology» more  CRYPTO 1991»
13 years 8 months ago
CM-Curves with Good Cryptographic Properties
Our purpose is to describe elliptic curves with complex multiplication which in characteristic 2 have the following useful properties for constructing Diffie-HeUman type cryptosys...
Neal Koblitz
CRYPTO
1991
Springer
144views Cryptology» more  CRYPTO 1991»
13 years 8 months ago
Interactive Proofs with Space Bounded Provers
Recent results in interactive proof systems [?][?] [?] seem to indicate that it is easier for a prover in a single prover interactive proof system to cheat the verifier than it i...
Joe Kilian, Ronitt Rubinfeld
CRYPTO
1991
Springer
87views Cryptology» more  CRYPTO 1991»
13 years 8 months ago
Practical Quantum Oblivious Transfer
Charles H. Bennett, Gilles Brassard, Claude Cr&eac...
CRYPTO
1991
Springer
98views Cryptology» more  CRYPTO 1991»
13 years 8 months ago
A Calculus for Access Control in Distributed Systems
Martín Abadi, Michael Burrows, Butler W. La...