Sciweavers

CRYPTO
1990
Springer
58views Cryptology» more  CRYPTO 1990»
15 years 26 days ago
Structural Properties of One-way Hash Functions
We study the following two kinds of one-way hash functions: universal oneway hash functions (UOHs) and collision intractable hash functions (CIHs). The main property of the former...
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
CRYPTO
1990
Springer
62views Cryptology» more  CRYPTO 1990»
15 years 26 days ago
An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
CRYPTO
1990
Springer
69views Cryptology» more  CRYPTO 1990»
15 years 26 days ago
CORSAIR: A SMART Card for Public Key Cryptosystems
Dominique de Waleffe, Jean-Jacques Quisquater
CRYPTO
1990
Springer
78views Cryptology» more  CRYPTO 1990»
15 years 26 days ago
How to Time-Stamp a Digital Document
The prospect of a world in which all text, audio, picture, and video documents are in digital form on easily modi able media raises the issue of how to certify when a document was...
Stuart Haber, W. Scott Stornetta
99
Voted
CRYPTO
1990
Springer
79views Cryptology» more  CRYPTO 1990»
15 years 26 days ago
Fair Computation of General Functions in Presence of Immoral Majority
This paper describes a method for n players, a majority of which may be faulty, to compute correctly, privately, and fairly any computable function f(Xl, ...,x,) where xi is the i...
Shafi Goldwasser, Leonid A. Levin