default search action
1st CRYPTO 1981: Santa Barbara, California, USA
- Allen Gersho:
Advances in Cryptology: A Report on CRYPTO 81, CRYPTO 81, IEEE Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981. U. C. Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04 1982 - Adi Shamir:
The Generation of Cryptographically Strong Pseudo-Random Sequences. CRYPTO 1981: 1 - Martin E. Hellman, Ehud D. Karnin, Justin M. Reyneri:
On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis. CRYPTO 1981: 2-6 - Hamid R. Amirazizi, Martin E. Hellman:
Time-Memory-Processor Tradeoffs. CRYPTO 1981: 7-9 - Leonard M. Adleman:
Primality Testing. CRYPTO 1981: 10 - Manuel Blum:
Coin Flipping by Telephone. CRYPTO 1981: 11-15 - Paul S. Henry, R. D. Nash:
High-Speed Hardware Implementation of the Knapsack Cipher. CRYPTO 1981: 16 - Hamid R. Amirazizi, Ehud D. Karnin, Justin M. Reyneri:
A Polynomial Time Solution for Compact Knapsacks. CRYPTO 1981: 17-19 - Ingemar Ingemarsson:
Some Comments on the Knapsack Problem. CRYPTO 1981: 20-24 - John P. Jordan:
Variant of a Public Key Cryptosystem Based on Goppa Codes. CRYPTO 1981: 25-30 - Gustavus J. Simmons:
A System for Point-of-Sale or Access User Authentication and Identification. CRYPTO 1981: 31-37 - Alan G. Konheim:
One-way Sequence for Transaction Verification. CRYPTO 1981: 38 - Miles E. Smid:
DES '81: An Update. CRYPTO 1981: 39-40 - Donald W. Davies:
Some Regular Properties of the DES. CRYPTO 1981: 41 - Don R. Morrison:
Subtractive Encryptors - Alternatives to the DES. CRYPTO 1981: 42-52 - J. A. Gordon:
Towards a Design Procedure for Cryptosecure Substitution Boxes. CRYPTO 1981: 53 - Gilles Brassard:
An Optimally Secure Relativized Cryptosystem. CRYPTO 1981: 54-58 - Subhash C. Kak:
Scrambling and Randomization. CRYPTO 1981: 59-63 - Brian P. Schanning, J. Kowalchuk:
Memo: A Hybrid Approach to Encrypted Electronic Mail. CRYPTO 1981: 64 - Henk Meijer, Selim G. Akl:
Digital Signature Scheme for Computer Communication Networks. CRYPTO 1981: 65-70 - Richard A. DeMillo, Nancy A. Lynch, Michael Merritt:
The Design and Analysis of Cryptographic Protocols. CRYPTO 1981: 71-72 - Thomas A. Berson:
Local Network Cryptosystem Architecture. CRYPTO 1981: 73-78 - George B. Purdy, Gustavus J. Simmons, James Studier:
Software Protection Using "Communal Key Cryptosystems". CRYPTO 1981: 79 - Stephen T. Kent:
Some Cryptographic Techniques for File Protection. CRYPTO 1981: 80 - Sig Porter:
A Password Extension for Improved Human Factors. CRYPTO 1981: 81 - G. R. Blakley:
Key Management from a Security Viewpoint. CRYPTO 1981: 82 - Y. Alfred Lau, Tom McPherson:
Implementation of a Hybrid {RSA/DES} Key Management System. CRYPTO 1981: 83 - Whitfield Diffie:
Cryptography, the Next Two Decades. CRYPTO 1981: 84-108 - Stephen B. Weinstein:
Security Mechanisms in Electronic Cards. CRYPTO 1981: 109 - J. Michael Nye:
Current Market: Products, Costs, Trends. CRYPTO 1981: 110-114 - Lin-Shan Lee, Ger-Chih Chou:
Results on Sampling-based Scrambling for Secure Speech Communication. CRYPTO 1981: 115-119 - Aaron D. Wyner:
Some Thoughts on Speech Encryption. CRYPTO 1981: 120 - H. J. Beker:
Nonlinear Feedback Shift Register Sequences. CRYPTO 1981: 121-123 - Albert L. Lang, Janet T. Vasek:
Evaluating Relative Security of Commercial ComSec Devices. CRYPTO 1981: 124-129 - Morrie Gasser:
Limitations on the Use of Encryption to Enforce Mandatory Security. CRYPTO 1981: 130-134 - J. Michael Nye:
The Import/Export Dilemma. CRYPTO 1981: 135-137 - David Chaum:
Verification by Anonymous Monitors. CRYPTO 1981: 138-139 - Ernst Henze:
A General Public Key System. CRYPTO 1981: 140-141 - Tore Herlestam:
Discussion of Adleman's Subexponential Algorithm for Computing Discrete Logarithms. CRYPTO 1981: 142-147 - Shimon Even:
Protocol for Signing Contracts. CRYPTO 1981: 148-153 - Whitfield Diffie, Melville Klein, Michael L. Dertouzos, Andrew Gleason, Dean Smith:
National Security and Commercial Security: Division of Responsibility. CRYPTO 1981: 154-156
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.