David Chaum (Ed.):
Advances in Cryptology,
Proceedings of CRYPTO '83. Plenum Press,
New York,
1984
- J. C. Lagarias:
Knapsack Public Key Cryptosystems and Diophantine Approximation.
3-23 BibTeX
- Ernest F. Brickell:
Solving Low Density Knapsacks.
25-37 BibTeX
- Ernest F. Brickell, J. C. Lagarias, Andrew M. Odlyzko:
Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems.
39-42 BibTeX
- Shimon Even, Oded Goldreich:
On the Power of Cascade Ciphers.
43-50 BibTeX
- Gustavus J. Simmons:
The Prisoners' Problem and the Subliminal Channel.
51-67 BibTeX
- Hugh C. Williams:
An Overview of Factoring.
71-80 BibTeX
- Carl Pomerance, Jeffrey W. Smith, Samuel S. Wagstaff Jr.:
New Ideas for Factoring Large Integers.
81-85 BibTeX
- Marvin C. Wunderlich:
Factoring Numbers on the Massively Parallel Computer.
87-102 BibTeX
- James A. Davis, Diane B. Holdridge:
Factorization Using the Quadratic Sieve Algorithm.
103-113 BibTeX
- H. Ong, Claus-Peter Schnorr:
Signatures through Approximate Representation by Quadratic Forms.
117-131 BibTeX
- Oded Goldreich:
A Simple Protocol for Signing Contracts.
133-136 BibTeX
- Manuel Blum, Umesh V. Vazirani, Vijay V. Vazirani:
Reducibility Among Protocols.
137-146 BibTeX
- Tom Tedrick:
How to Exchange Half a Bit.
147-151 BibTeX
- David Chaum:
Blind Signature System.
153 BibTeX
- M. E. Spencerr, S. E. Travares:
A Layered Broadcast Cryptographic System.
157-170 BibTeX
- Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters:
Analytical Characteristics of the DES.
171-202 BibTeX
- Robert S. Winternitz:
Producing a One-Way Hash Function from DES.
203-207 BibTeX
- Selim G. Akl:
On the Security of Compressed Encodings.
209-230 BibTeX
- Dorothy E. Denning:
Field Encryption and Authentication.
231-247 BibTeX
- James A. Reeds, N. J. A. Sloane:
Shift-Register Synthesis (Modula m).
249 BibTeX
- Joel E. Sachs, Shimshon Berkovits:
Probabilistic Analysis and Performance Modelling of the `Swedish' Algorithm and Modifications.
253-273 BibTeX
- Taher El Gamal:
A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p²).
275-292 BibTeX
- Rudolf Lidl, Winfried B. Müller:
Permutation Polynomials in RSA-Cryptosystems.
293-301 BibTeX
- Helmut Jürgensen, D. E. Matthew:
Some Results on the Information Theoretic Analysis of Cryptosystems.
303-356 BibTeX
- Bahaa W. Fam:
Improving the Security of Exponential Key Exchange.
359-368 BibTeX
- Umesh V. Vazirani, Vijay V. Vazirani:
RSA Bits are 732+epsilon Secure.
369-375 BibTeX
- Donald W. Davies:
Use of the `Signature Token' to Create a Negotiable Document.
377-382 BibTeX
- Shimon Even, Oded Goldreich:
Electronic Wallet.
383-386 BibTeX
- David Chaum:
Design Concepts for Tamper Responding Systems.
387-392 BibTeX
Copyright © Sat May 16 23:03:53 2009
by Michael Ley (ley@uni-trier.de)