The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1984 (conf/crypto/84)

  1. S. C. Serpell, C. B. Brookson, B. L. Clark
    A Prototype Encryption System Using Public Key. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:3-9 [Conf]
  2. Taher El Gamal
    A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:10-18 [Conf]
  3. Neal R. Wagner, Marianne R. Magyarik
    A Public Key Cryptosystem Based on the Word Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:19-36 [Conf]
  4. H. Ong, Claus-Peter Schnorr, Adi Shamir
    Efficient Signature Schemes Based on Polynomial Equations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:37-46 [Conf]
  5. Adi Shamir
    Identity-Based Cryptosystems and Signature Schemes. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1984, pp:47-53 [Conf]
  6. Benny Chor, Ronald L. Rivest
    A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:54-65 [Conf]
  7. Hugh C. Williams
    Some Public Key Crypto-Functions as Intractable as Factorization. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:66-70 [Conf]
  8. Ian F. Blake, Ronald C. Mullin, Scott A. Vanstone
    Computing Logarithms in GF(2n). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:73-82 [Conf]
  9. Burton S. Kaliski Jr.
    Wyner's Analog Encryption Scheme: Results of a Simulation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:83-94 [Conf]
  10. Su-Shing Chen
    On Rotation Group and Encryption of Analog Signals. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:95-100 [Conf]
  11. Albert C. Leighton, Stephen M. Matyas
    The History of Book Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:101-113 [Conf]
  12. James A. Davis, Diane B. Holdridge
    An Update on Factorization at Sandia National Laboratories (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:114- [Conf]
  13. R. C. Fairfield, A. Matusevich, J. Plany
    An LSI Digital Encryption Processor (DEP). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:115-143 [Conf]
  14. Marc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, Jean-Jacques Quisquater
    Efficient Hardware and Software Implementations for the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:144-146 [Conf]
  15. Frank Hoornaert, Jo Goubert, Yvo Desmedt
    Efficient Hardware Implementation of the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:147-173 [Conf]
  16. Norman Proctor
    A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:174-190 [Conf]
  17. Umesh V. Vazirani, Vijay V. Vazirani
    Efficient and Secure Pseudo-Random Number Generation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:193-202 [Conf]
  18. R. C. Fairfield, R. L. Mortenson, K. B. Coulthart
    An LSI Random Number Generator (RNG). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:203-230 [Conf]
  19. Suresh C. Kothari
    Generalized Linear Threshold Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:231-241 [Conf]
  20. G. R. Blakley, Catherine Meadows
    Security of Ramp Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:242-268 [Conf]
  21. Selim G. Akl, Henk Meijer
    A Fast Pseudo Random Permutation Generator With Applications to Cryptology. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:269-275 [Conf]
  22. Oded Goldreich, Shafi Goldwasser, Silvio Micali
    On the Cryptographic Applications of Random Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:276-288 [Conf]
  23. Manuel Blum, Shafi Goldwasser
    An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:289-302 [Conf]
  24. Benny Chor, Oded Goldreich
    RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:303-313 [Conf]
  25. G. R. Blakley
    Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:314-338 [Conf]
  26. Alan G. Konheim
    Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:339-341 [Conf]
  27. Ernest F. Brickell
    Breaking Iterated Knapsacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:342-358 [Conf]
  28. Yvo Desmedt, Jean-Jacques Quisquater, Marc Davio
    Dependence of Output on Input in DES: Small Avalanche Characteristics. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:359-376 [Conf]
  29. James A. Reeds, J. L. Manferdelli
    DES Has No Per Round Linear Factors. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:377-389 [Conf]
  30. Donald W. Davies
    A Message Authenticator Algorithm Suitable for A Mainframe Computer. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:393-400 [Conf]
  31. Henry Beker, Michael Walker
    Key Management for Secure Electronic Funds Transfer in a Retail Environment. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:401-410 [Conf]
  32. Gustavus J. Simmons
    Authentication Theory/Coding Theory. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:411-431 [Conf]
  33. David Chaum
    New Secret Codes Can Prevent a Computerized Big Brother (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:432-433 [Conf]
  34. Tom Tedrick
    Fair Exchange of Secrets. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1984, pp:434-438 [Conf]
  35. Moti Yung
    Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:439-453 [Conf]
  36. Steven Fortune, Michael Merritt
    Poker Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:454-464 [Conf]
  37. Shafi Goldwasser, Silvio Micali, Ronald L. Rivest
    A "Paradoxical'"Solution to the Signature Problem (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:467- [Conf]
  38. A. K. Leung, Stafford E. Tavares
    Sequence Complexity as a Test for Cryptographic Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:468-474 [Conf]
  39. Charles H. Bennett, Gilles Brassard
    An Update on Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:475-480 [Conf]
  40. David Chaum
    How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:481-485 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002