2. CRYPTO 1982:
Santa Barbara,
California,
USA
David Chaum,
Ronald L. Rivest,
Alan T. Sherman (Eds.):
Advances in Cryptology:
Proceedings of CRYPTO '82. Plemum,
New York,
1983
- Martin E. Hellman, Justin M. Reyneri:
Fast Computation of Discrete Logarithms in GF(q).
3-13 BibTeX
- Ernest F. Brickell, Judy H. Moore:
Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).
15-19 BibTeX
- Ravi Janardan, K. B. Lakshmanan:
A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.
21-37 BibTeX
- G. R. Blakley, Laif Swanson:
Infinite Structures in Information Theory.
39-50 BibTeX
- Ernest F. Brickell:
A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography.
51-60 BibTeX
- Lenore Blum, Manuel Blum, Mike Shub:
Comparison of Two Pseudo-Random Number Generators.
61-78 BibTeX
- Gilles Brassard:
On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.
79-86 BibTeX
- Donald W. Davies:
Some Regular Properties of the `Data Encryption Standard' Algorithm.
89-96 BibTeX
- Donald W. Davies, Graeme I. P. Parkin:
The Average Cycle Size of the Key Stream in Output Feedback Encipherment.
97-98 BibTeX
- Robert R. Jueneman:
Analysis of Certain Aspects of Output Feedback Mode.
99-127 BibTeX
- Martin E. Hellman, Justin M. Reyneri:
Drainage and the DES.
129-131 BibTeX
- Robert S. Winternitz:
Security of a Keystream Cipher with Secret Initial Value.
133-137 BibTeX
- G. M. Avis, Stafford E. Tavares:
Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.
139-143 BibTeX
- Ronald L. Rivest, Alan T. Sherman:
Randomized Encryption Techniques.
145-163 BibTeX
- Danny Dolev, Avi Wigderson:
On the Security of Multi-Party Protocols in Distributed Systems.
167-175 BibTeX
- Danny Dolev, Shimon Even, Richard M. Karp:
On the Security of Ping-Pong Protocols.
177-186 BibTeX
- Luc Longpré:
The Use of Public-Key Cryptography for Signing Checks.
187-197 BibTeX
- David Chaum:
Blind Signatures for Untraceable Payments.
199-203 BibTeX
- Shimon Even, Oded Goldreich, Abraham Lempel:
A Randomized Protocol for Signing Contracts.
205-210 BibTeX
- Shafi Goldwasser, Silvio Micali, Andrew Chi-Chih Yao:
On Signatures and Authentication.
211-215 BibTeX
- Christian Müller-Schloer, Neal R. Wagner:
Cryptographic Protection of Personal Data Cards.
219-229 BibTeX
- Rolf Blom:
Non-Public Key Distribution.
231-236 BibTeX
- Selim G. Akl, Peter D. Taylor:
Cryptographic Solution to a Multilevel Security Problem.
237-249 BibTeX
- Thomas A. Berson:
Local Network Cryptosystem Architecture: Access Control.
251-258 BibTeX
- Leonard M. Adleman:
Implementing an Electronic Notary Public.
259-265 BibTeX
- Charles H. Bennett, Gilles Brassard, Seth Breidbard, Stephen Wiesner:
Quantum Cryptography, or Unforgeable Subway Tokens.
267-275 BibTeX
- Adi Shamir:
A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.
279-288 BibTeX
- Ernest F. Brickell, James A. Davis, Gustavus J. Simmons:
A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.
289-301 BibTeX
- Leonard M. Adleman:
On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.
303-308 BibTeX
- Thomas A. Berson:
Long Key Variants of DES.
311-313 BibTeX
- Shimon Even, Oded Goldreich:
On the Security of Multi-Party Ping-Pong Protocols.
315 BibTeX
- Joan B. Plumstead:
Inferring a Sequence Produced by a Linear Congruence.
317-319 BibTeX
- Michael Merritt:
Key Reconstruction.
321-322 BibTeX
- Carl Nicolai:
Nondeterministic Cryptography.
323-326 BibTeX
- Ronald L. Rivest:
A Short Report on the RSA Chip.
327 BibTeX
Copyright © Sat May 16 23:03:52 2009
by Michael Ley (ley@uni-trier.de)