What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1990
Year
Venue
Title
1990
CRYPTO
(title unknown)
★
Invited talk
Whitfield Diffie
1990
CRYPTO
A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms
Paul C. van Oorschot
1990
CRYPTO
A Key Distribution "Paradox"
Yacov Yacobi
1990
CRYPTO
A Modular Approach to Key Distribution
Walter Fumy
Michael Munzert
1990
CRYPTO
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion
Kwangjo Kim
Tsutomu Matsumoto
Hideki Imai
1990
CRYPTO
A Statistical Attack of the FEAL-8 Cryptosystem
Henri Gilbert
Guy Chassé
1990
CRYPTO
A Universal Statistical Test for Random Bit Generators
Ueli Maurer
1990
CRYPTO
Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract)
Yvo Desmedt
Moti Yung
1990
CRYPTO
Achieving Zero-Knowledge Robustly
Joe Kilian
1990
CRYPTO
Adi Shamir: On the Universality of the Next Bit Test
A. W. Schrift
1990
CRYPTO
Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings
1990
CRYPTO
An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications
Kencheng Zeng
Chung-Huang Yang
T. R. N. Rao
1990
CRYPTO
Collective Coin Tossing Without Assumptions nor Broadcasting
Silvio Micali
Tal Rabin
1990
CRYPTO
Complexity Theoretic Issues Concerning Block Ciphers Related to D.E.S
Richard Cleve
1990
CRYPTO
Computation of Discrete Logarithms in Prime Fields (Extended Abstract)
Brian A. LaMacchia
Andrew M. Odlyzko
1990
CRYPTO
Constructing Elliptic Curve Cryptosystems in Characteristic 2
Neal Koblitz
1990
CRYPTO
Convertible Undeniable Signatures
Joan Boyar
David Chaum
Ivan Damgård
Torben P. Pedersen
1990
CRYPTO
CORSAIR: A SMART Card for Public Key Cryptosystems
Dominique de Waleffe
Jean-Jacques Quisquater
1990
CRYPTO
Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems
Alfredo De Santis
Moti Yung
1990
CRYPTO
Cryptographic Significance of the Carry for Ciphers Based on Integer Addition
Othmar Staffelbach
Willi Meier
1990
CRYPTO
Differential Cryptanalysis of DES-like Cryptosystems
★
Invited paper
Eli Biham
Adi Shamir
1990
CRYPTO
Discrete-Log With Compressible Exponents
Yacov Yacobi
1990
CRYPTO
Fair Computation of General Functions in Presence of Immoral Majority
Shafi Goldwasser
Leonid A. Levin
1990
CRYPTO
Fast Checkers for Cryptography
Kireeti Kompella
Leonard M. Adleman
1990
CRYPTO
Fast Software Encryption Functions
Ralph C. Merkle
1990
CRYPTO
Finding Four Million Large Random Primes
Ronald L. Rivest
1990
CRYPTO
Geometric Shared Secret and/or Shared Control Schemes
★
Invited paper
Gustavus J. Simmons
1990
CRYPTO
Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract)
Donald Beaver
Joan Feigenbaum
Victor Shoup
1990
CRYPTO
How to Time-Stamp a Digital Document
Stuart Haber
W. Scott Stornetta
1990
CRYPTO
How to Utilize the Randomness of Zero-Knowledge Proofs
Tatsuaki Okamoto
Kazuo Ohta
1990
CRYPTO
Identification Tokens - or: Solving the Chess Grandmaster Problem
Thomas Beth
Yvo Desmedt
1990
CRYPTO
Interactive Proofs with Provable Security Against Honest Verifiers
Joe Kilian
1990
CRYPTO
Matrix Extensions of the RSA Algorithm
Chih-Chwen Chuang
James George Dunham
1990
CRYPTO
Multi-Language Zero Knowledge Interactive Proof Systems
Kaoru Kurosawa
Shigeo Tsujii
1990
CRYPTO
Nonlinear Parity Circuits and their Cryptographic Applications
Kenji Koyama
Routo Terada
1990
CRYPTO
On the Computation of Discrete Logarithms in Class Groups
Johannes Buchmann
Stephan Düllmann
1990
CRYPTO
On the Impossibility of Private Key Cryptography with Weakly Random Keys
James L. McInnes
Benny Pinkas
1990
CRYPTO
One-Way Group Actions
Gilles Brassard
Moti Yung
1990
CRYPTO
Publicly Verifiable Non-Interactive Zero-Knowledge Proofs
Dror Lapidot
Adi Shamir
1990
CRYPTO
Quantum Bit Commitment and Coin Tossing Protocols
Gilles Brassard
Claude Crépeau
1990
CRYPTO
Security with Low Communication Overhead
Donald Beaver
Joan Feigenbaum
Joe Kilian
Phillip Rogaway
1990
CRYPTO
Solving Large Sparse Linear Systems over Finite Fields
Brian A. LaMacchia
Andrew M. Odlyzko
1990
CRYPTO
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
Ernest F. Brickell
Douglas R. Stinson
1990
CRYPTO
Structural Properties of One-way Hash Functions
Yuliang Zheng
Tsutomu Matsumoto
Hideki Imai
1990
CRYPTO
Systolic Modular Multiplication
Shimon Even
1990
CRYPTO
The FEAL Cipher Family
Shoji Miyaguchi
1990
CRYPTO
The MD4 Message Digest Algorithm
Ronald L. Rivest
1990
CRYPTO
The REDOC II Cryptosystem
Thomas W. Cusick
Michael C. Wood
1990
CRYPTO
Unconditionally Secure Digital Signatures
David Chaum
Sandra Roijakkers