Skip to main content
  • Conference proceedings
  • © 1990

Advances in Cryptology - CRYPTO '88

Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 403)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (44 papers)

  1. On the Theory of Security I

    1. Proving Security Against Chosen Ciphertext Attacks

      • Manuel Blum, Paul Feldman, Silvio Micali
      Pages 256-268
    2. Non-Interactive Zero-Knowledge with Preprocessing

      • Alfredo De Santis, Silvio Micali, Giuseppe Persiano
      Pages 269-282
  2. On the Theory of Security II

    1. The Noisy Oracle Problem

      • U. Feige, A. Shamir, M. Tennenholtz
      Pages 284-296
    2. On Generating Solved Instances of Computational Problems

      • Martín Abadi, Eric Allendert, Andrei Broder, Joan Feigenbaum, Lane A. Hemachandra
      Pages 297-310
  3. Protocols

    1. Untraceable Electronic Cash

      • David Chaum, Amos Fiat, Moni Naor
      Pages 319-327
    2. A Universal Problem in Secure and Verifiable Distributed Computation

      • Ming-Deli A. Huang, Shang-Hua Teng
      Pages 336-352
  4. Security Concerns

    1. An Abstract Theory of Computer Viruses

      • Leonard M. Adleman
      Pages 354-374
    2. How to (Really) Share a Secret

      • Gustavus J. Simmons
      Pages 390-448
  5. Linear Complexity

    1. On the Linear Syndrome Method in Cryptanalysis

      • Kencheng Zeng, Minqiang Hung
      Pages 469-478
    2. Aperiodic Linear Complexities of de Bruijn Sequences

      • Richard T. C. Kwok, Maurice Beale
      Pages 479-482
  6. Systems

    1. Speeding Up Secret Computations with Insecure Auxiliary Devices

      • Tsutomu Matsumoto, Koki Kato, Hideki Imai
      Pages 497-506
    2. Developing Ethernet Enhanced-Security System

      • B. J. Herbison
      Pages 507-519
    3. A Secure Audio Teleconference System

      • D. G. Steer, L. Strawczynski, W. Diffie, M. Wiener
      Pages 520-528
  7. Short Rump Session Presentations

    1. Secret Error-Correcting Codes (SECC)

      • Tzonelih Hwang, T. R. N. Rao
      Pages 540-563

Editors and Affiliations

  • Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, USA

    Shafi Goldwasser

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access