Direct anonymous attestation | 387 | 19.95 | 2004 |
Sharing Block Ciphers | 12 | 1.52 | 2000 |
Design Validations for Discrete Logarithm Based Signature Schemes | 51 | 4.30 | 2000 |
Trustee-based tracing extensions to anonymous cash and the making of anonymous change | 90 | 10.54 | 1995 |
Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings | 27 | 16.86 | 1993 |
An interactive identification scheme based on discrete logarithms and factoring | 51 | 20.05 | 1992 |
Fast Exponentiation with Precomputation (Extended Abstract) | 26 | 17.27 | 1992 |
On the Classification of Ideal Secret Sharing Schemes | 129 | 18.30 | 1991 |
On the structure of minimum-weight k-connected spanning networks | 26 | 2.03 | 1990 |
Cryptanalysis of video encryption based on space-filling curves | 14 | 2.00 | 1989 |
Some ideal secret sharing schemes | 124 | 18.98 | 1989 |
Authentication Codes with Multiple Arbiters (Extended Abstract) | 1 | 0.98 | 1988 |
Secure Audio Teleconference | 12 | 10.67 | 1987 |
On Privacy Homomorphisms (Extended Abstract) | 14 | 1.21 | 1987 |
Cryptanalysis of the Yagisawa Public Key Cryptosystem | 1 | 0.58 | 1986 |
An attack on a signature scheme proposed by Okamoto and Shiraishi | 21 | 16.07 | 1985 |
Breaking iterated knapsacks | 18 | 11.94 | 1984 |
Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems | 4 | 1.12 | 1983 |
Solving Low Density Knapsacks | 31 | 4.25 | 1983 |
Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p) | 1 | 0.63 | 1982 |
A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography | 40 | 15.23 | 1982 |
A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems | 1 | 0.40 | 1982 |