CRYPTO A*

36 papers

YearTitle / Authors
1983Advances in Cryptology: Proceedings of CRYPTO '82, Santa Barbara, California, USA, August 23-25, 1982.
David Chaum, Ronald L. Rivest, Alan T. Sherman
1982A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography.
Ernest F. Brickell
1982A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.
Adi Shamir
1982A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.
Ernest F. Brickell, James A. Davis, Gustavus J. Simmons
1982A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.
Ravi Janardan, K. B. Lakshmanan
1982A Randomized Protocol for Signing Contracts.
Shimon Even, Oded Goldreich, Abraham Lempel
1982A Short Report on the RSA Chip.
Ronald L. Rivest
1982Analysis of Certain Aspects of Output Feedback Mode.
Robert R. Jueneman
1982Blind Signatures for Untraceable Payments.
David Chaum
1982Comparison of Two Pseudo-Random Number Generators.
Lenore Blum, Manuel Blum, Mike Shub
1982Cryptographic Protection of Personal Data Cards.
Christian Müller-Schloer, Neal R. Wagner
1982Cryptographic Solution to a Multilevel Security Problem.
Selim G. Akl, Peter D. Taylor
1982Drainage and the DES.
Martin E. Hellman, Justin M. Reyneri
1982Fast Computation of Discrete Logarithms in GF(q).
Martin E. Hellman, Justin M. Reyneri
1982Implementing an Electronic Notary Public.
Leonard M. Adleman
1982Inferring a Sequence Produced by a Linear Congruence.
Joan B. Plumstead
1982Infinite Structures in Information Theory.
G. R. Blakley, Laif Swanson
1982Key Reconstruction.
Michael Merritt
1982Local Network Cryptosystem Architecture: Access Control.
Thomas A. Berson
1982Long Key Variants of DES.
Thomas A. Berson
1982Non-Public Key Distribution.
Rolf Blom
1982Nondeterministic Cryptography.
Carl Nicolai
1982On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.
Leonard M. Adleman
1982On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.
Gilles Brassard
1982On Signatures and Authentication.
Shafi Goldwasser, Silvio Micali, Andrew Chi-Chih Yao
1982On the Security of Multi-Party Ping-Pong Protocols.
Shimon Even, Oded Goldreich
1982On the Security of Multi-Party Protocols in Distributed Systems.
Danny Dolev, Avi Wigderson
1982On the Security of Ping-Pong Protocols.
Danny Dolev, Shimon Even, Richard M. Karp
1982Quantum Cryptography, or Unforgeable Subway Tokens.
Charles H. Bennett, Gilles Brassard, Seth Breidbart, Stephen Wiesner
1982Randomized Encryption Techniques.
Ronald L. Rivest, Alan T. Sherman
1982Security of a Keystream Cipher with Secret Initial Value.
Robert S. Winternitz
1982Some Regular Properties of the 'Data Encryption Standard' Algorithm.
Donald W. Davies
1982Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2
Ernest F. Brickell, Judy H. Moore
1982The Average Cycle Size of the Key Stream in Output Feedback Encipherment.
Donald W. Davies, Graeme I. P. Parkin
1982The Use of Public-Key Cryptography for Signing Checks.
Luc Longpré
1982Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.
G. M. Avis, Stafford E. Tavares