-
1
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
In Odlyzko, A.M., ed., Springer-Verlag, 1987
-
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In Odlyzko, A.M., ed.: Advances in Cryptology— CRYPTO ’86. Volume 263 of Lecture Notes in Computer Science., Springer-Verlag, 1987 (1986) 186–194
-
(1986)
Advances in Cryptology— CRYPTO ’86. Volume 263 of Lecture Notes in Computer Science
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
2
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24 (1981)
-
(1981)
Communications of the ACM
, pp. 24
-
-
Lamport, L.1
-
3
-
-
84995399871
-
Human identification through insecure channel
-
In Davies, D.W., ed., Springer-Verlag
-
Matsumoto, T., Imai, H.: Human identification through insecure channel. In Davies, D.W., ed.: Advances in Cryptology—EUROCRYPT' 91. Volume 547 of Lecture Notes in Computer Science., Springer-Verlag (1991) 409–421
-
(1991)
Advances in Cryptology—EUROCRYPT' 91. Volume 547 of Lecture Notes in Computer Science
, pp. 409-421
-
-
Matsumoto, T.1
Imai, H.2
-
4
-
-
84957372142
-
On the Matsumoto and Imai’s human identification scheme
-
In Guillou, L.C., Quisquater, J.J., eds., Springer- Verlag
-
Wang, C.H., Hwang, T., Tsai, J.J.: On the Matsumoto and Imai’s human identification scheme. In Guillou, L.C., Quisquater, J.J., eds.: Advances in Cryptology— EUROCRYPT '95. Volume 921 of Lecture Notes in Computer Science., Springer- Verlag (1995) 382–392
-
(1995)
Advances in Cryptology— EUROCRYPT '95. Volume 921 of Lecture Notes in Computer Science
, pp. 382-392
-
-
Wang, C.H.1
Hwang, T.2
Tsai, J.J.3
-
5
-
-
0029712968
-
Human-computer cryptography: An attempt
-
In Neuman, C., ed., New Delhi, India, ACM Press
-
Matsumoto, T.: Human-computer cryptography: An attempt. In Neuman, C., ed.: 3rd ACM Conference on Computer and Communications Security, New Delhi, India, ACM Press (1996) 68–75
-
(1996)
3Rd ACM Conference on Computer and Communications Security
, pp. 68-75
-
-
Matsumoto, T.1
-
6
-
-
84958648410
-
Visual authentication and identification
-
In Kaliski Jr., B.S., ed., Springer-Verlag
-
Naor, M., Pinkas, B.: Visual authentication and identification. In Kaliski Jr., B.S., ed.: Advances in Cryptology—CRYPTO ’97. Volume 1294 of Lecture Notes in Computer Science., Springer-Verlag (1997) 322–336
-
(1997)
Advances in Cryptology—CRYPTO ’97. Volume 1294 of Lecture Notes in Computer Science
, pp. 322-336
-
-
Naor, M.1
Pinkas, B.2
-
10
-
-
84877639283
-
Cryptographic primitives based on hard learning problems
-
In Stinson, D.R., ed., Springer-Verlag
-
Blum, A., Furst, M., Kearns, M., Lipton, R.J.: Cryptographic primitives based on hard learning problems. In Stinson, D.R., ed.: Advances in Cryptology— CRYPTO ’93. Volume 773 of Lecture Notes in Computer Science., Springer-Verlag (1993) 278–291
-
(1993)
Advances in Cryptology— CRYPTO ’93. Volume 773 of Lecture Notes in Computer Science
, pp. 278-291
-
-
Blum, A.1
Furst, M.2
Kearns, M.3
Lipton, R.J.4
-
11
-
-
0033702346
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
Portland, Oregon
-
Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. In: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, Portland, Oregon (2000)
-
(2000)
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
13
-
-
0025022876
-
Self-testing/correcting with applications to numerical problems
-
Baltimore, Maryland
-
Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. In: Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, Baltimore, Maryland (1990) 73–83
-
(1990)
Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing
, pp. 73-83
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
|