1. CRYPTO 1981:
Santa Barbara,
California,
USA
Allen Gersho (Ed.):
Advances in Cryptology:
A Report on CRYPTO 81,
CRYPTO 81,
IEEE Workshop on Communications Security,
Santa Barbara,
August 24-26,
1981. U.C. Santa Barbara,
Dept. of Elec. and Computer Eng.,
ECE Report No 82-04,
1982
- Adi Shamir:
The Generation of Cryptographically Strong Pseudo-Random Sequences.
1 BibTeX
- Martin E. Hellman, Ehud D. Karnin, Justin M. Reyneri:
On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis.
2-6 BibTeX
- Hamid R. Amirazizi, Martin E. Hellman:
Time-Memory-Processor Tradeoffs.
7-9 BibTeX
- Leonard M. Adleman:
Primality Testing.
10 BibTeX
- Manuel Blum:
Coin Flipping by Telephone.
11-15 BibTeX
- Paul S. Henry, R. D. Nash:
High-Speed Hardware Implementation of the Knapsack Cipher.
16 BibTeX
- Hamid R. Amirazizi, Ehud D. Karnin, Justin M. Reyneri:
A Polynomial Time Solution for Compact Knapsacks.
17-19 BibTeX
- Ingemar Ingemarsson:
Some Comments on the Knapsack Problem.
20-24 BibTeX
- John P. Jordan:
Variant of a Public Key Cryptosystem Based on Goppa Codes.
25-30 BibTeX
- Gustavus J. Simmons:
A System for Point-of-Sale or Access User Authentication and Identification.
31-37 BibTeX
- Alan G. Konheim:
One-way Sequence for Transaction Verification.
38 BibTeX
- Miles E. Smid:
DES '81: An Update.
39-40 BibTeX
- Donald W. Davies:
Some Regular Properties of the DES.
41 BibTeX
- Don R. Morrison:
Subtractive Encryptors - Alternatives to the DES.
42-52 BibTeX
- J. A. Gordon:
Towards a Design Procedure for Cryptosecure Substitution Boxes.
53 BibTeX
- Gilles Brassard:
An Optimally Secure Relativized Cryptosystem.
54-58 BibTeX
- Subhash C. Kak:
Scrambling and Randomization.
59-63 BibTeX
- Brian P. Schanning, J. Kowalchuk:
Memo: A Hybrid Approach to Encrypted Electronic Mail.
64 BibTeX
- Henk Meijer, Selim G. Akl:
Digital Signature Scheme for Computer Communication Networks.
65-70 BibTeX
- Richard A. DeMillo, Nancy A. Lynch, Michael Merritt:
The Design and Analysis of Cryptographic Protocols.
71-72 BibTeX
- Thomas A. Berson:
Local Network Cryptosystem Architecture.
73-78 BibTeX
- George B. Purdy, Gustavus J. Simmons, James Studier:
Software Protection Using ``Communal Key Cryptosystems''.
79 BibTeX
- Stephen T. Kent:
Some Cryptographic Techniques for File Protection.
80 BibTeX
- Sig Porter:
A Password Extension for Improved Human Factors.
81 BibTeX
- G. R. Blakley:
Key Management from a Security Viewpoint.
82 BibTeX
- Y. Alfred Lau, Tom McPherson:
Implementation of a Hybrid {RSA/DES} Key Management System.
83 BibTeX
- Whitfield Diffie:
Cryptography, the Next Two Decades.
84-108 BibTeX
- Stephen B. Weinstein:
Security Mechanisms in Electronic Cards.
109 BibTeX
- J. Michael Nye:
Current Market: Products, Costs, Trends.
110-114 BibTeX
- Lin-Shan Lee, Ger-chih Chow:
Results on Sampling-based Scrambling for Secure Speech Communication.
115-119 BibTeX
- A. D. Wyner:
Some Thoughts on Speech Encryption.
120 BibTeX
- H. J. Beker:
Nonlinear Feedback Shift Register Sequences.
121-123 BibTeX
- Albert L. Lang, Janet T. Vasek:
Evaluating Relative Security of Commercial ComSec Devices.
124-129 BibTeX
- Morrie Gasser:
Limitations on the Use of Encryption to Enforce Mandatory Security.
130-134 BibTeX
- J. Michael Nye:
The Import/Export Dilemma.
135-137 BibTeX
- David Chaum:
Verification by Anonymous Monitors.
138-139 BibTeX
- Ernst Henze:
A General Public Key System.
140-141 BibTeX
- Tore Herlestam:
Discussion of Adleman's Subexponential Algorithm for Computing Discrete Logarithms.
142-147 BibTeX
- Shimon Even:
Protocol for Signing Contracts.
148-153 BibTeX
- Whitfield Diffie, Melville Klein, Michael L. Dertouzos, Andrew Gleason, Dean Smith:
National Security and Commercial Security: Division of Responsibility.
154-156 BibTeX
Copyright © Sat May 16 23:03:52 2009
by Michael Ley (ley@uni-trier.de)