Conferences in DBLP
Martin E. Hellman , Justin M. Reyneri Fast Computation of Discrete Logarithms in GF(q). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:3-13 [Conf ] Ernest F. Brickell , Judy H. Moore Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p ). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:15-19 [Conf ] Ravi Janardan , K. B. Lakshmanan A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:21-37 [Conf ] G. R. Blakley , Laif Swanson Infinite Structures in Information Theory. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:39-50 [Conf ] Ernest F. Brickell A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:51-60 [Conf ] Lenore Blum , Manuel Blum , Mike Shub Comparison of Two Pseudo-Random Number Generators. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:61-78 [Conf ] Gilles Brassard On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:79-86 [Conf ] Donald W. Davies Some Regular Properties of the `Data Encryption Standard' Algorithm. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:89-96 [Conf ] Donald W. Davies , Graeme I. P. Parkin The Average Cycle Size of the Key Stream in Output Feedback Encipherment. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:97-98 [Conf ] Robert R. Jueneman Analysis of Certain Aspects of Output Feedback Mode. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:99-127 [Conf ] Martin E. Hellman , Justin M. Reyneri Drainage and the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:129-131 [Conf ] Robert S. Winternitz Security of a Keystream Cipher with Secret Initial Value. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:133-137 [Conf ] G. M. Avis , Stafford E. Tavares Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:139-143 [Conf ] Ronald L. Rivest , Alan T. Sherman Randomized Encryption Techniques. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:145-163 [Conf ] Danny Dolev , Avi Wigderson On the Security of Multi-Party Protocols in Distributed Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:167-175 [Conf ] Danny Dolev , Shimon Even , Richard M. Karp On the Security of Ping-Pong Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:177-186 [Conf ] Luc Longpré The Use of Public-Key Cryptography for Signing Checks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:187-197 [Conf ] David Chaum Blind Signatures for Untraceable Payments. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1982, pp:199-203 [Conf ] Shimon Even , Oded Goldreich , Abraham Lempel A Randomized Protocol for Signing Contracts. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:205-210 [Conf ] Shafi Goldwasser , Silvio Micali , Andrew Chi-Chih Yao On Signatures and Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:211-215 [Conf ] Christian Müller-Schloer , Neal R. Wagner Cryptographic Protection of Personal Data Cards. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:219-229 [Conf ] Rolf Blom Non-Public Key Distribution. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:231-236 [Conf ] Selim G. Akl , Peter D. Taylor Cryptographic Solution to a Multilevel Security Problem. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1982, pp:237-249 [Conf ] Thomas A. Berson Local Network Cryptosystem Architecture: Access Control. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:251-258 [Conf ] Leonard M. Adleman Implementing an Electronic Notary Public. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:259-265 [Conf ] Charles H. Bennett , Gilles Brassard , Seth Breidbard , Stephen Wiesner Quantum Cryptography, or Unforgeable Subway Tokens. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:267-275 [Conf ] Adi Shamir A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:279-288 [Conf ] Ernest F. Brickell , James A. Davis , Gustavus J. Simmons A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:289-301 [Conf ] Leonard M. Adleman On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:303-308 [Conf ] Thomas A. Berson Long Key Variants of DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:311-313 [Conf ] Shimon Even , Oded Goldreich On the Security of Multi-Party Ping-Pong Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:315- [Conf ] Joan B. Plumstead Inferring a Sequence Produced by a Linear Congruence. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:317-319 [Conf ] Michael Merritt Key Reconstruction. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:321-322 [Conf ] Carl Nicolai Nondeterministic Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:323-326 [Conf ] Ronald L. Rivest A Short Report on the RSA Chip. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:327- [Conf ]