Abuses in Cryptography and How to Fight Them
- 1 January 1990
- book chapter
- Published by Springer Nature
- p. 375-389
- https://doi.org/10.1007/0-387-34799-2_29
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Efficient Factoring Based on Partial InformationPublished by Springer Nature ,2007
- An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial InformationPublished by Springer Nature ,2000
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- Ways to verify the US-Soviet arms pactIEEE Spectrum, 1988
- Non-interactive zero-knowledge and its applicationsPublished by Association for Computing Machinery (ACM) ,1988
- Special Uses and Abuses of the Fiat-Shamir Passport Protocol (extended abstract)Published by Springer Nature ,1988
- Zero knowledge proofs of identityPublished by Association for Computing Machinery (ACM) ,1987
- Non-transitive transfer of confidence: A perfect zero-knowledge interactive protocol for SAT and beyondPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- Encryption and Secure Computer NetworksACM Computing Surveys, 1979
- A note on the confinement problemCommunications of the ACM, 1973