The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1981 (conf/crypto/81)

  1. Adi Shamir
    The Generation of Cryptographically Strong Pseudo-Random Sequences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:1- [Conf]
  2. Martin E. Hellman, Ehud D. Karnin, Justin M. Reyneri
    On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:2-6 [Conf]
  3. Hamid R. Amirazizi, Martin E. Hellman
    Time-Memory-Processor Tradeoffs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:7-9 [Conf]
  4. Leonard M. Adleman
    Primality Testing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:10- [Conf]
  5. Manuel Blum
    Coin Flipping by Telephone. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:11-15 [Conf]
  6. Paul S. Henry, R. D. Nash
    High-Speed Hardware Implementation of the Knapsack Cipher. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:16- [Conf]
  7. Hamid R. Amirazizi, Ehud D. Karnin, Justin M. Reyneri
    A Polynomial Time Solution for Compact Knapsacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:17-19 [Conf]
  8. Ingemar Ingemarsson
    Some Comments on the Knapsack Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:20-24 [Conf]
  9. John P. Jordan
    Variant of a Public Key Cryptosystem Based on Goppa Codes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:25-30 [Conf]
  10. Gustavus J. Simmons
    A System for Point-of-Sale or Access User Authentication and Identification. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:31-37 [Conf]
  11. Alan G. Konheim
    One-way Sequence for Transaction Verification. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:38- [Conf]
  12. Miles E. Smid
    DES '81: An Update. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:39-40 [Conf]
  13. Donald W. Davies
    Some Regular Properties of the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:41- [Conf]
  14. Don R. Morrison
    Subtractive Encryptors - Alternatives to the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:42-52 [Conf]
  15. J. A. Gordon
    Towards a Design Procedure for Cryptosecure Substitution Boxes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:53- [Conf]
  16. Gilles Brassard
    An Optimally Secure Relativized Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:54-58 [Conf]
  17. Subhash C. Kak
    Scrambling and Randomization. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:59-63 [Conf]
  18. Brian P. Schanning, J. Kowalchuk
    Memo: A Hybrid Approach to Encrypted Electronic Mail. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:64- [Conf]
  19. Henk Meijer, Selim G. Akl
    Digital Signature Scheme for Computer Communication Networks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:65-70 [Conf]
  20. Richard A. DeMillo, Nancy A. Lynch, Michael Merritt
    The Design and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:71-72 [Conf]
  21. Thomas A. Berson
    Local Network Cryptosystem Architecture. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:73-78 [Conf]
  22. George B. Purdy, Gustavus J. Simmons, James Studier
    Software Protection Using ``Communal Key Cryptosystems''. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:79- [Conf]
  23. Stephen T. Kent
    Some Cryptographic Techniques for File Protection. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:80- [Conf]
  24. Sig Porter
    A Password Extension for Improved Human Factors. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:81- [Conf]
  25. G. R. Blakley
    Key Management from a Security Viewpoint. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:82- [Conf]
  26. Y. Alfred Lau, Tom McPherson
    Implementation of a Hybrid {RSA/DES} Key Management System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:83- [Conf]
  27. Whitfield Diffie
    Cryptography, the Next Two Decades. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:84-108 [Conf]
  28. Stephen B. Weinstein
    Security Mechanisms in Electronic Cards. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:109- [Conf]
  29. J. Michael Nye
    Current Market: Products, Costs, Trends. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:110-114 [Conf]
  30. Lin-Shan Lee, Ger-chih Chow
    Results on Sampling-based Scrambling for Secure Speech Communication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:115-119 [Conf]
  31. A. D. Wyner
    Some Thoughts on Speech Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:120- [Conf]
  32. H. J. Beker
    Nonlinear Feedback Shift Register Sequences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:121-123 [Conf]
  33. Albert L. Lang, Janet T. Vasek
    Evaluating Relative Security of Commercial ComSec Devices. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:124-129 [Conf]
  34. Morrie Gasser
    Limitations on the Use of Encryption to Enforce Mandatory Security. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:130-134 [Conf]
  35. J. Michael Nye
    The Import/Export Dilemma. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:135-137 [Conf]
  36. David Chaum
    Verification by Anonymous Monitors. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:138-139 [Conf]
  37. Ernst Henze
    A General Public Key System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:140-141 [Conf]
  38. Tore Herlestam
    Discussion of Adleman's Subexponential Algorithm for Computing Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:142-147 [Conf]
  39. Shimon Even
    Protocol for Signing Contracts. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:148-153 [Conf]
  40. Whitfield Diffie, Melville Klein, Michael L. Dertouzos, Andrew Gleason, Dean Smith
    National Security and Commercial Security: Division of Responsibility. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:154-156 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002