CRYPTO A*

41 papers

YearTitle / Authors
1985Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings
G. R. Blakley, David Chaum
1984A "Paradoxical'"Solution to the Signature Problem (Abstract).
Shafi Goldwasser, Silvio Micali, Ronald L. Rivest
1984A Fast Pseudo Random Permutation Generator With Applications to Cryptology.
Selim G. Akl, Henk Meijer
1984A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields.
Benny Chor, Ronald L. Rivest
1984A Message Authenticator Algorithm Suitable for A Mainframe Computer.
Donald W. Davies
1984A Prototype Encryption System Using Public Key.
Stephen C. Serpell, C. B. Brookson, B. L. Clark
1984A Public Key Cryptosystem Based on the Word Problem.
Neal R. Wagner, Marianne R. Magyarik
1984A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.
Taher El Gamal
1984A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation.
Norman Proctor
1984An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information.
Manuel Blum, Shafi Goldwasser
1984An LSI Digital Encryption Processor (DEP).
Robert C. Fairfield, Alex Matusevich, Joseph Plany
1984An LSI Random Number Generator (RNG).
Robert C. Fairfield, Robert L. Mortenson, K. B. Coulthart
1984An Update on Factorization at Sandia National Laboratories (Abstract).
James A. Davis, Diane B. Holdridge
1984An Update on Quantum Cryptography.
Charles H. Bennett, Gilles Brassard
1984Authentication Theory/Coding Theory.
Gustavus J. Simmons
1984Breaking Iterated Knapsacks.
Ernest F. Brickell
1984Computing Logarithms in GF(2
Ian F. Blake, Ronald C. Mullin, Scott A. Vanstone
1984Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract).
Alan G. Konheim
1984Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract).
Moti Yung
1984DES Has No Per Round Linear Factors.
James A. Reeds, John L. Manferdelli
1984Dependence of Output on Input in DES: Small Avalanche Characteristics.
Yvo Desmedt, Jean-Jacques Quisquater, Marc Davio
1984Efficient Hardware Implementation of the DES.
Frank Hoornaert, Jo Goubert, Yvo Desmedt
1984Efficient Hardware and Software Implementations for the DES.
Marc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, Jean-Jacques Quisquater
1984Efficient Signature Schemes Based on Polynomial Equations.
H. Ong, Claus-Peter Schnorr, Adi Shamir
1984Efficient and Secure Pseudo-Random Number Generation.
Umesh V. Vazirani, Vijay V. Vazirani
1984Fair Exchange of Secrets.
Tom Tedrick
1984Generalized Linear Threshold Scheme.
Suresh C. Kothari
1984How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems.
David Chaum
1984Identity-Based Cryptosystems and Signature Schemes.
Adi Shamir
1984Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects.
G. R. Blakley
1984Key Management for Secure Electronic Funds Transfer in a Retail Environment.
Henry Beker, Michael Walker
1984New Secret Codes Can Prevent a Computerized Big Brother (Abstract).
David Chaum
1984On Rotation Group and Encryption of Analog Signals.
Su-shing Chen
1984On the Cryptographic Applications of Random Functions.
Oded Goldreich, Shafi Goldwasser, Silvio Micali
1984Poker Protocols.
Steven Fortune, Michael Merritt
1984RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure.
Benny Chor, Oded Goldreich
1984Security of Ramp Schemes.
G. R. Blakley, Catherine Meadows
1984Sequence Complexity as a Test for Cryptographic Systems.
A. K. Leung, Stafford E. Tavares
1984Some Public Key Crypto-Functions as Intractable as Factorization.
Hugh C. Williams
1984The History of Book Ciphers.
Albert C. Leighton, Stephen M. Matyas
1984Wyner's Analog Encryption Scheme: Results of a Simulation.
Burton S. Kaliski Jr.