default search action
4th CRYPTO 1984: Santa Barbara, California, USA
- G. R. Blakley, David Chaum:
Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings. Lecture Notes in Computer Science 196, Springer 1985, ISBN 3-540-15658-5
Public Key Cryptosystems and Signatures
- Stephen C. Serpell, C. B. Brookson, B. L. Clark:
A Prototype Encryption System Using Public Key. 3-9 - Taher El Gamal:
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. 10-18 - Neal R. Wagner, Marianne R. Magyarik:
A Public Key Cryptosystem Based on the Word Problem. 19-36 - H. Ong, Claus-Peter Schnorr, Adi Shamir:
Efficient Signature Schemes Based on Polynomial Equations. 37-46 - Adi Shamir:
Identity-Based Cryptosystems and Signature Schemes. 47-53 - Benny Chor, Ronald L. Rivest:
A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields. 54-65 - Hugh C. Williams:
Some Public Key Crypto-Functions as Intractable as Factorization. 66-70
Cryptosystems and Other Hard Problems
- Ian F. Blake, Ronald C. Mullin, Scott A. Vanstone:
Computing Logarithms in GF(2n). 73-82 - Burton S. Kaliski Jr.:
Wyner's Analog Encryption Scheme: Results of a Simulation. 83-94 - Su-Shing Chen:
On Rotation Group and Encryption of Analog Signals. 95-100 - Albert C. Leighton, Stephen M. Matyas:
The History of Book Ciphers. 101-113 - James A. Davis, Diane B. Holdridge:
An Update on Factorization at Sandia National Laboratories (Abstract). 114 - Robert C. Fairfield, Alex Matusevich, Joseph Plany:
An LSI Digital Encryption Processor (DEP). 115-143 - Marc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, Jean-Jacques Quisquater:
Efficient Hardware and Software Implementations for the DES. 144-146 - Frank Hoornaert, Jo Goubert, Yvo Desmedt:
Efficient Hardware Implementation of the DES. 147-173 - Norman Proctor:
A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation. 174-190
Randomness And Its Concomitants
- Umesh V. Vazirani, Vijay V. Vazirani:
Efficient and Secure Pseudo-Random Number Generation. 193-202 - Robert C. Fairfield, Robert L. Mortenson, K. B. Coulthart:
An LSI Random Number Generator (RNG). 203-230 - Suresh C. Kothari:
Generalized Linear Threshold Scheme. 231-241 - G. R. Blakley, Catherine Meadows:
Security of Ramp Schemes. 242-268 - Selim G. Akl, Henk Meijer:
A Fast Pseudo Random Permutation Generator With Applications to Cryptology. 269-275 - Oded Goldreich, Shafi Goldwasser, Silvio Micali:
On the Cryptographic Applications of Random Functions. 276-288 - Manuel Blum, Shafi Goldwasser:
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. 289-302
Analysis and Cryptanalysis
- Benny Chor, Oded Goldreich:
RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure. 303-313 - G. R. Blakley:
Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects. 314-338 - Alan G. Konheim:
Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract). 339-341 - Ernest F. Brickell:
Breaking Iterated Knapsacks. 342-358 - Yvo Desmedt, Jean-Jacques Quisquater, Marc Davio:
Dependence of Output on Input in DES: Small Avalanche Characteristics. 359-376 - James A. Reeds, John L. Manferdelli:
DES Has No Per Round Linear Factors. 377-389
Protocols and Authentication
- Donald W. Davies:
A Message Authenticator Algorithm Suitable for A Mainframe Computer. 393-400 - Henry Beker, Michael Walker:
Key Management for Secure Electronic Funds Transfer in a Retail Environment. 401-410 - Gustavus J. Simmons:
Authentication Theory/Coding Theory. 411-431 - David Chaum:
New Secret Codes Can Prevent a Computerized Big Brother (Abstract). 432-433 - Tom Tedrick:
Fair Exchange of Secrets. 434-438 - Moti Yung:
Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract). 439-453 - Steven Fortune, Michael Merritt:
Poker Protocols. 454-464
Impromptu Talks
- Shafi Goldwasser, Silvio Micali, Ronald L. Rivest:
A "Paradoxical'"Solution to the Signature Problem (Abstract). 467 - A. K. Leung, Stafford E. Tavares:
Sequence Complexity as a Test for Cryptographic Systems. 468-474 - Charles H. Bennett, Gilles Brassard:
An Update on Quantum Cryptography. 475-480 - David Chaum:
How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. 481-485
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.