4. CRYPTO 1984:
Santa Barbara,
California,
USA
G. R. Blakley, David Chaum (Eds.):
Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings.
Lecture Notes in Computer Science 196 Springer 1985, ISBN 3-540-15658-5 BibTeX
@proceedings{DBLP:conf/crypto/1984,
editor = {G. R. Blakley and
David Chaum},
title = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara,
California, USA, August 19-22, 1984, Proceedings},
booktitle = {CRYPTO},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {196},
year = {1985},
isbn = {3-540-15658-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Public Key Cryptosystems and Signatures
Cryptosystems and Other Hard Problems
- Ian F. Blake, Ronald C. Mullin, Scott A. Vanstone:
Computing Logarithms in GF(2n).
73-82
Electronic Edition (Springer LINK) BibTeX
- Burton S. Kaliski Jr.:
Wyner's Analog Encryption Scheme: Results of a Simulation.
83-94
Electronic Edition (Springer LINK) BibTeX
- Su-Shing Chen:
On Rotation Group and Encryption of Analog Signals.
95-100
Electronic Edition (Springer LINK) BibTeX
- Albert C. Leighton, Stephen M. Matyas:
The History of Book Ciphers.
101-113
Electronic Edition (Springer LINK) BibTeX
- James A. Davis, Diane B. Holdridge:
An Update on Factorization at Sandia National Laboratories (Abstract).
114
Electronic Edition (Springer LINK) BibTeX
- R. C. Fairfield, A. Matusevich, J. Plany:
An LSI Digital Encryption Processor (DEP).
115-143
Electronic Edition (Springer LINK) BibTeX
- Marc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, Jean-Jacques Quisquater:
Efficient Hardware and Software Implementations for the DES.
144-146
Electronic Edition (Springer LINK) BibTeX
- Frank Hoornaert, Jo Goubert, Yvo Desmedt:
Efficient Hardware Implementation of the DES.
147-173
Electronic Edition (Springer LINK) BibTeX
- Norman Proctor:
A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation.
174-190
Electronic Edition (Springer LINK) BibTeX
Randomness And Its Concomitants
Analysis and Cryptoanalysis
Protocols and Authentication
Impromptu Talks
Copyright © Sat May 16 23:03:53 2009
by Michael Ley (ley@uni-trier.de)