CRYPTO A*

41 papers

YearTitle / Authors
1982Advances in Cryptology: A Report on CRYPTO 81, CRYPTO 81, IEEE Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981.
Allen Gersho
1981A General Public Key System.
Ernst Henze
1981A Password Extension for Improved Human Factors.
Sig Porter
1981A Polynomial Time Solution for Compact Knapsacks.
Hamid R. Amirazizi, Ehud D. Karnin, Justin M. Reyneri
1981A System for Point-of-Sale or Access User Authentication and Identification.
Gustavus J. Simmons
1981An Optimally Secure Relativized Cryptosystem.
Gilles Brassard
1981Coin Flipping by Telephone.
Manuel Blum
1981Cryptography, the Next Two Decades.
Whitfield Diffie
1981Current Market: Products, Costs, Trends.
J. Michael Nye
1981DES '81: An Update.
Miles E. Smid
1981Digital Signature Scheme for Computer Communication Networks.
Henk Meijer, Selim G. Akl
1981Discussion of Adleman's Subexponential Algorithm for Computing Discrete Logarithms.
Tore Herlestam
1981Evaluating Relative Security of Commercial ComSec Devices.
Albert L. Lang, Janet T. Vasek
1981High-Speed Hardware Implementation of the Knapsack Cipher.
Paul S. Henry, R. D. Nash
1981Implementation of a Hybrid {RSA/DES} Key Management System.
Y. Alfred Lau, Tom McPherson
1981Key Management from a Security Viewpoint.
G. R. Blakley
1981Limitations on the Use of Encryption to Enforce Mandatory Security.
Morrie Gasser
1981Local Network Cryptosystem Architecture.
Thomas A. Berson
1981Memo: A Hybrid Approach to Encrypted Electronic Mail.
Brian P. Schanning, J. Kowalchuk
1981National Security and Commercial Security: Division of Responsibility.
Whitfield Diffie, Melville Klein, Michael L. Dertouzos, Andrew Gleason, Dean Smith
1981Nonlinear Feedback Shift Register Sequences.
H. J. Beker
1981On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis.
Martin E. Hellman, Ehud D. Karnin, Justin M. Reyneri
1981One-way Sequence for Transaction Verification.
Alan G. Konheim
1981Primality Testing.
Leonard M. Adleman
1981Protocol for Signing Contracts.
Shimon Even
1981Results on Sampling-based Scrambling for Secure Speech Communication.
Lin-Shan Lee, Ger-Chih Chou
1981Scrambling and Randomization.
Subhash C. Kak
1981Security Mechanisms in Electronic Cards.
Stephen B. Weinstein
1981Software Protection Using "Communal Key Cryptosystems".
George B. Purdy, Gustavus J. Simmons, James Studier
1981Some Comments on the Knapsack Problem.
Ingemar Ingemarsson
1981Some Cryptographic Techniques for File Protection.
Stephen T. Kent
1981Some Regular Properties of the DES.
Donald W. Davies
1981Some Thoughts on Speech Encryption.
Aaron D. Wyner
1981Subtractive Encryptors - Alternatives to the DES.
Don R. Morrison
1981The Design and Analysis of Cryptographic Protocols.
Richard A. DeMillo, Nancy A. Lynch, Michael Merritt
1981The Generation of Cryptographically Strong Pseudo-Random Sequences.
Adi Shamir
1981The Import/Export Dilemma.
J. Michael Nye
1981Time-Memory-Processor Tradeoffs.
Hamid R. Amirazizi, Martin E. Hellman
1981Towards a Design Procedure for Cryptosecure Substitution Boxes.
J. A. Gordon
1981Variant of a Public Key Cryptosystem Based on Goppa Codes.
John P. Jordan
1981Verification by Anonymous Monitors.
David Chaum