Conferences in DBLP
S. C. Serpell , C. B. Brookson , B. L. Clark A Prototype Encryption System Using Public Key. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:3-9 [Conf ] Taher El Gamal A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:10-18 [Conf ] Neal R. Wagner , Marianne R. Magyarik A Public Key Cryptosystem Based on the Word Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:19-36 [Conf ] H. Ong , Claus-Peter Schnorr , Adi Shamir Efficient Signature Schemes Based on Polynomial Equations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:37-46 [Conf ] Adi Shamir Identity-Based Cryptosystems and Signature Schemes. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1984, pp:47-53 [Conf ] Benny Chor , Ronald L. Rivest A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:54-65 [Conf ] Hugh C. Williams Some Public Key Crypto-Functions as Intractable as Factorization. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:66-70 [Conf ] Ian F. Blake , Ronald C. Mullin , Scott A. Vanstone Computing Logarithms in GF(2^{n} ). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:73-82 [Conf ] Burton S. Kaliski Jr. Wyner's Analog Encryption Scheme: Results of a Simulation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:83-94 [Conf ] Su-Shing Chen On Rotation Group and Encryption of Analog Signals. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:95-100 [Conf ] Albert C. Leighton , Stephen M. Matyas The History of Book Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:101-113 [Conf ] James A. Davis , Diane B. Holdridge An Update on Factorization at Sandia National Laboratories (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:114- [Conf ] R. C. Fairfield , A. Matusevich , J. Plany An LSI Digital Encryption Processor (DEP). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:115-143 [Conf ] Marc Davio , Yvo Desmedt , Jo Goubert , Frank Hoornaert , Jean-Jacques Quisquater Efficient Hardware and Software Implementations for the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:144-146 [Conf ] Frank Hoornaert , Jo Goubert , Yvo Desmedt Efficient Hardware Implementation of the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:147-173 [Conf ] Norman Proctor A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:174-190 [Conf ] Umesh V. Vazirani , Vijay V. Vazirani Efficient and Secure Pseudo-Random Number Generation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:193-202 [Conf ] R. C. Fairfield , R. L. Mortenson , K. B. Coulthart An LSI Random Number Generator (RNG). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:203-230 [Conf ] Suresh C. Kothari Generalized Linear Threshold Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:231-241 [Conf ] G. R. Blakley , Catherine Meadows Security of Ramp Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:242-268 [Conf ] Selim G. Akl , Henk Meijer A Fast Pseudo Random Permutation Generator With Applications to Cryptology. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:269-275 [Conf ] Oded Goldreich , Shafi Goldwasser , Silvio Micali On the Cryptographic Applications of Random Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:276-288 [Conf ] Manuel Blum , Shafi Goldwasser An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:289-302 [Conf ] Benny Chor , Oded Goldreich RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:303-313 [Conf ] G. R. Blakley Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:314-338 [Conf ] Alan G. Konheim Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:339-341 [Conf ] Ernest F. Brickell Breaking Iterated Knapsacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:342-358 [Conf ] Yvo Desmedt , Jean-Jacques Quisquater , Marc Davio Dependence of Output on Input in DES: Small Avalanche Characteristics. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:359-376 [Conf ] James A. Reeds , J. L. Manferdelli DES Has No Per Round Linear Factors. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:377-389 [Conf ] Donald W. Davies A Message Authenticator Algorithm Suitable for A Mainframe Computer. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:393-400 [Conf ] Henry Beker , Michael Walker Key Management for Secure Electronic Funds Transfer in a Retail Environment. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:401-410 [Conf ] Gustavus J. Simmons Authentication Theory/Coding Theory. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:411-431 [Conf ] David Chaum New Secret Codes Can Prevent a Computerized Big Brother (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:432-433 [Conf ] Tom Tedrick Fair Exchange of Secrets. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1984, pp:434-438 [Conf ] Moti Yung Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:439-453 [Conf ] Steven Fortune , Michael Merritt Poker Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:454-464 [Conf ] Shafi Goldwasser , Silvio Micali , Ronald L. Rivest A "Paradoxical'"Solution to the Signature Problem (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:467- [Conf ] A. K. Leung , Stafford E. Tavares Sequence Complexity as a Test for Cryptographic Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:468-474 [Conf ] Charles H. Bennett , Gilles Brassard An Update on Quantum Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:475-480 [Conf ] David Chaum How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:481-485 [Conf ]