The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1982 (conf/crypto/82)

  1. Martin E. Hellman, Justin M. Reyneri
    Fast Computation of Discrete Logarithms in GF(q). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:3-13 [Conf]
  2. Ernest F. Brickell, Judy H. Moore
    Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:15-19 [Conf]
  3. Ravi Janardan, K. B. Lakshmanan
    A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:21-37 [Conf]
  4. G. R. Blakley, Laif Swanson
    Infinite Structures in Information Theory. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:39-50 [Conf]
  5. Ernest F. Brickell
    A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:51-60 [Conf]
  6. Lenore Blum, Manuel Blum, Mike Shub
    Comparison of Two Pseudo-Random Number Generators. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:61-78 [Conf]
  7. Gilles Brassard
    On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:79-86 [Conf]
  8. Donald W. Davies
    Some Regular Properties of the `Data Encryption Standard' Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:89-96 [Conf]
  9. Donald W. Davies, Graeme I. P. Parkin
    The Average Cycle Size of the Key Stream in Output Feedback Encipherment. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:97-98 [Conf]
  10. Robert R. Jueneman
    Analysis of Certain Aspects of Output Feedback Mode. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:99-127 [Conf]
  11. Martin E. Hellman, Justin M. Reyneri
    Drainage and the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:129-131 [Conf]
  12. Robert S. Winternitz
    Security of a Keystream Cipher with Secret Initial Value. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:133-137 [Conf]
  13. G. M. Avis, Stafford E. Tavares
    Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:139-143 [Conf]
  14. Ronald L. Rivest, Alan T. Sherman
    Randomized Encryption Techniques. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:145-163 [Conf]
  15. Danny Dolev, Avi Wigderson
    On the Security of Multi-Party Protocols in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:167-175 [Conf]
  16. Danny Dolev, Shimon Even, Richard M. Karp
    On the Security of Ping-Pong Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:177-186 [Conf]
  17. Luc Longpré
    The Use of Public-Key Cryptography for Signing Checks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:187-197 [Conf]
  18. David Chaum
    Blind Signatures for Untraceable Payments. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1982, pp:199-203 [Conf]
  19. Shimon Even, Oded Goldreich, Abraham Lempel
    A Randomized Protocol for Signing Contracts. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:205-210 [Conf]
  20. Shafi Goldwasser, Silvio Micali, Andrew Chi-Chih Yao
    On Signatures and Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:211-215 [Conf]
  21. Christian Müller-Schloer, Neal R. Wagner
    Cryptographic Protection of Personal Data Cards. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:219-229 [Conf]
  22. Rolf Blom
    Non-Public Key Distribution. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:231-236 [Conf]
  23. Selim G. Akl, Peter D. Taylor
    Cryptographic Solution to a Multilevel Security Problem. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1982, pp:237-249 [Conf]
  24. Thomas A. Berson
    Local Network Cryptosystem Architecture: Access Control. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:251-258 [Conf]
  25. Leonard M. Adleman
    Implementing an Electronic Notary Public. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:259-265 [Conf]
  26. Charles H. Bennett, Gilles Brassard, Seth Breidbard, Stephen Wiesner
    Quantum Cryptography, or Unforgeable Subway Tokens. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:267-275 [Conf]
  27. Adi Shamir
    A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:279-288 [Conf]
  28. Ernest F. Brickell, James A. Davis, Gustavus J. Simmons
    A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:289-301 [Conf]
  29. Leonard M. Adleman
    On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:303-308 [Conf]
  30. Thomas A. Berson
    Long Key Variants of DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:311-313 [Conf]
  31. Shimon Even, Oded Goldreich
    On the Security of Multi-Party Ping-Pong Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:315- [Conf]
  32. Joan B. Plumstead
    Inferring a Sequence Produced by a Linear Congruence. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:317-319 [Conf]
  33. Michael Merritt
    Key Reconstruction. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:321-322 [Conf]
  34. Carl Nicolai
    Nondeterministic Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:323-326 [Conf]
  35. Ronald L. Rivest
    A Short Report on the RSA Chip. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:327- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002