-
1
-
-
85030321900
-
When, photographs lie
-
July 30
-
J. Alter. When, photographs lie. Newsweek, pp. 44-45, July 30, 1990.
-
(1990)
Newsweek
, pp. 44-45
-
-
Alter, J.1
-
2
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Nov
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850-864, Nov. 1984.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
4
-
-
85028868533
-
Collision-free hash functions and public-key signature schemes
-
Lecture Notes in Computer Science, vol. 304, Springer-Verlag, Berlin
-
I. Damgård. Collision-free hash functions and public-key signature schemes. In Advances in Cryptology-Eurocrypt '87, pp. 203-217. Lecture Notes in Computer Science, vol. 304, Springer-Verlag, Berlin, 1988.
-
(1988)
Advances in Cryptology-Eurocrypt '87
, pp. 203-217
-
-
Damgård, I.1
-
5
-
-
84981199109
-
A design principle for hash functions
-
(G. Brassard), Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
I. Damgård. A design principle for hash functions. In. Advances in Cryptology-Crypto '89 (ed. G. Brassard), pp. 416-427. Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990.
-
(1990)
Advances in Cryptology-Crypto '89
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
6
-
-
85030325268
-
On the design of provably secure cryptographic hash functions
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear
-
A. DeSantis and M. Yung. On the design of provably secure cryptographic hash functions. In Advances in Cryptology-Eurocrypt '90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.
-
Advances in Cryptology-Eurocrypt '90
-
-
DeSantis, A.1
Yung, M.2
-
9
-
-
0021409284
-
Probabilistic encryption
-
April
-
S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, 28:270-299, April 1984.
-
(1984)
JCSS
, vol.28
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
10
-
-
0023985465
-
A secure digital signature scheme
-
S. Goldwasser, S. Micali, and R. Rivest. A secure digital signature scheme. SIAM Journal on Computing, 17(2):281-308, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
11
-
-
84909328655
-
Ask it no questions: The camera can lie
-
section 2, August 12
-
Andy Grundberg. Ask it no questions: The camera can lie. The New York Times, section 2, pp. 1, 29, August 12, 1990.
-
(1990)
The New York Times
-
-
Grundberg, A.1
-
12
-
-
0024866111
-
Pseudorandom generation from one-way functions
-
ACM, New York
-
R. Impagliazzo, L. Levin, and M. Luby. Pseudorandom generation from one-way functions. In Proc. 21st STOC, pp. 12-24. ACM, New York, 1989.
-
(1989)
Proc. 21st STOC
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.2
Luby, M.3
-
13
-
-
0024770898
-
One-way functions are essential for complexity-based cryptography
-
IEEE, New York
-
R. Impagliazzo and M. Luby. One-way functions are essential for complexity-based cryptography. In Proc. 30th FOCS, pp. 230-235. IEEE, New York, 1989.
-
(1989)
Proc. 30th FOCS
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
14
-
-
0006900885
-
-
American Chemical Society, Washington, B. C
-
H. M. Kanare. Writing the laboratory notebook, p. 117. American Chemical Society, Washington, B. C., 1985.
-
(1985)
Writing the laboratory notebook
, pp. 117
-
-
Kanare, H.M.1
-
16
-
-
84937461306
-
One-way hash functions and DES
-
(G. Brassard), Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
R. C. Merkle. One-way hash functions and DES. In Advances in Cryptology-Crypto '89 (ed. G. Brassard), pp. 428-446. Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990.
-
(1990)
Advances in Cryptology-Crypto '89
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
17
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM, New York
-
M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proc. 21st STOC, pp. 33-43. ACM, New York, 1989.
-
(1989)
Proc. 21st STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
18
-
-
0010277907
-
Digitalized signatures
-
R. A. DeMillo et al., Academic Press
-
M. O. Rabin. Digitalized signatures. In Foundations of Secure Computation (ed. R. A. DeMillo et al.), pp. 155-168. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 155-168
-
-
Rabin, M.O.1
-
20
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
ACM, New York
-
J. Rompel. One-way functions are necessary and sufficient for secure signatures. In Proc. 22nd STOC, pp. 387-394. ACM, New York, 1990.
-
(1990)
Proc. 22nd STOC
, pp. 387-394
-
-
Rompel, J.1
-
21
-
-
84944486544
-
Prediction and entropy of printed English
-
C. Shannon. Prediction and entropy of printed English. Bell System Technical Journal, vol. 30 pp. 50-64, 1951.
-
(1951)
Bell System Technical Journal
, vol.30
, pp. 50-64
-
-
Shannon, C.1
-
22
-
-
0020301290
-
Theory and applications of trapdoor functions
-
IEEE, New York
-
A. C. Yao. Theory and applications of trapdoor functions. In Proc. 23rd FOCS, pp. 80-91. IEEE, New York, 1982.
-
(1982)
Proc. 23rd FOCS
, pp. 80-91
-
-
Yao, A.C.1
|