Abstract is missing.
- Standards for Data Security - A Change of DirectionWyn L. Price. 3-8 [doi]
- Integrating Cryptography in ISDNKåre Presttun. 9-18 [doi]
- Special Uses and Abuses of the Fiat-Shamir Passport ProtocolYvo Desmedt, Claude Goutier, Samy Bengio. 21-39 [doi]
- Direct Minimum-Knowledge ComputationsRussell Impagliazzo, Moti Yung. 40-51 [doi]
- Non-Interactive Zero-Knowledge Proof SystemsAlfredo De Santis, Silvio Micali, Giuseppe Persiano. 52-72 [doi]
- How to Solve any Protocol Problem - An Efficiency ImprovementOded Goldreich, Ronen Vainish. 73-86 [doi]
- Multiparty Computations Ensuring Privacy of Each Party s Input and Correctness of the ResultDavid Chaum, Ivan Damgård, Jeroen van de Graaf. 87-119 [doi]
- Society and Group Oriented Cryptography: A New ConceptYvo Desmedt. 120-127 [doi]
- A Simple and Secure Way to Show the Validity of Your Public KeyJeroen van de Graaf, René Peralta. 128-134 [doi]
- Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key ModelZvi Galil, Stuart Haber, Moti Yung. 135-155 [doi]
- Gradual and Verifiable Release of a SecretErnest F. Brickell, David Chaum, Ivan Damgård, Jeroen van de Graaf. 156-166 [doi]
- Strong Practical ProtocolsJudy H. Moore. 167-172 [doi]
- Identity-based Conference Key Distribution SystemsKenji Koyama, Kazuo Ohta. 175-184 [doi]
- On the Key Predistribution System: A Practical Solution to the Key Distribution ProblemTsutomu Matsumoto, Hideki Imai. 185-193 [doi]
- Key Distribution Systems Based on Identification InformationEiji Okamoto. 194-202 [doi]
- Secret Distribution of Keys for Public-Key SystemsJean-Jacques Quisquater. 203-208 [doi]
- An Impersonation-Proof Identity Verfication SchemeGustavus J. Simmons. 211-215 [doi]
- Arbitration in Tamper Proof SystemsGeorge I. Davida, Brian J. Matt. 216-222 [doi]
- Efficient Digital Public-Key Signature with Shadow (Abstract)Louis C. Guillou, Jean-Jacques Quisquater. 223 [doi]
- Security-Related Comments Regarding McEliece s Public-Key CryptosystemCarlisle M. Adams, Henk Meijer. 224-228 [doi]
- Components and Cycles of a Random FunctionJohn M. DeLaurentis. 231-242 [doi]
- Fast Spectral Tests for Measuring Nonrandomness and the DESFrank A. Feldman. 243-254 [doi]
- Other Cycling Tests for DES (Abstract)Jean-Jacques Quisquater, Jean-Paul Delescaille. 255-256 [doi]
- A Crypto-EngineGeorge I. Davida, Frank B. Dancs. 257-268 [doi]
- A Natural Taxonomy for Digital Information Authentication SchemesGustavus J. Simmons. 269-288 [doi]
- Analyzing Encryption Protocols Using Formal Verification Authentication SchemesRichard A. Kemmerer. 289-305 [doi]
- Cryptosystems Based on an Analog of Heat FlowG. R. Blakley, William Rundell. 306-329 [doi]
- A Combinatorial Approach to Threshold SchemesDouglas R. Stinson, Scott A. Vanstone. 330-339 [doi]
- A Realization Scheme for the Identity-Based CryptosystemHatsukazu Tanaka. 340-349 [doi]
- Equivalence Between Two Flavours of Oblivious TransfersClaude Crépeau. 350-354 [doi]
- A Construction for Authentication/Secrecy Codes from Certain Combinatorial DesignsDouglas R. Stinson. 355-366 [doi]
- A Digital Signature Based on a Conventional Encryption FunctionRalph C. Merkle. 369-378 [doi]
- How to Make Replicated Data SecureMaurice Herlihy, J. D. Tygar. 379-391 [doi]
- A Study of Password SecurityMichael Luby, Charles Rackoff. 392-397 [doi]
- A Video Scrambling Technique Based On Space Filling CurvesYossi Matias, Adi Shamir. 398-417 [doi]
- Secure Audio TeleconferenceErnest F. Brickell, Pil Joong Lee, Yacov Yacobi. 418-426 [doi]
- Attack on the Koyama-Ohta Identity Basedd Key Distribution SchemeYacov Yacobi. 429-433 [doi]
- On the F-function of FEALWalter Fumy. 434-437 [doi]
- Patterns of Entropy Drop of the Key in an S-Box of the DESKencheng Zeng, Jun-Hui Yang, Z. T. Dai. 438-444 [doi]
- The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext AttackRené Struik, Johan van Tilburg. 445-457 [doi]
- On Struik-Tilburg Cryptanalysis of Rao-Nam SchemeT. R. N. Rao. 458-460 [doi]
- A Generalization of Hellman s Extension of Shannon s Approach to Cryptography (Abstract)Pierre Beauchemin, Gilles Brassard. 461 [doi]
- Multiparty Unconditionally Secure Protocols (Abstract)David Chaum, Claude Crépeau, Ivan Damgård. 462 [doi]