default search action
3rd CRYPTO 1983
- David Chaum:
Advances in Cryptology, Proceedings of CRYPTO '83, Santa Barbara, California, USA, August 21-24, 1983. Plenum Press, New York 1984 - J. C. Lagarias:
Knapsack Public Key Cryptosystems and Diophantine Approximation. CRYPTO 1983: 3-23 - Ernest F. Brickell:
Solving Low Density Knapsacks. CRYPTO 1983: 25-37 - Ernest F. Brickell, J. C. Lagarias, Andrew M. Odlyzko:
Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems. CRYPTO 1983: 39-42 - Shimon Even, Oded Goldreich:
On the Power of Cascade Ciphers. CRYPTO 1983: 43-50 - Gustavus J. Simmons:
The Prisoners' Problem and the Subliminal Channel. CRYPTO 1983: 51-67 - Hugh C. Williams:
An Overview of Factoring. CRYPTO 1983: 71-80 - Carl Pomerance, Jeffrey W. Smith, Samuel S. Wagstaff Jr.:
New Ideas for Factoring Large Integers. CRYPTO 1983: 81-85 - Marvin C. Wunderlich:
Factoring Numbers on the Massively Parallel Computer. CRYPTO 1983: 87-102 - James A. Davis, Diane B. Holdridge:
Factorization Using the Quadratic Sieve Algorithm. CRYPTO 1983: 103-113 - H. Ong, Claus-Peter Schnorr:
Signatures through Approximate Representation by Quadratic Forms. CRYPTO 1983: 117-131 - Oded Goldreich:
A Simple Protocol for Signing Contracts. CRYPTO 1983: 133-136 - Manuel Blum, Umesh V. Vazirani, Vijay V. Vazirani:
Reducibility Among Protocols. CRYPTO 1983: 137-146 - Tom Tedrick:
How to Exchange Half a Bit. CRYPTO 1983: 147-151 - David Chaum:
Blind Signature System. CRYPTO 1983: 153 - M. E. Spencerr, S. E. Travares:
A Layered Broadcast Cryptographic System. CRYPTO 1983: 157-170 - Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters:
Analytical Characteristics of the DES. CRYPTO 1983: 171-202 - Robert S. Winternitz:
Producing a One-Way Hash Function from DES. CRYPTO 1983: 203-207 - Selim G. Akl:
On the Security of Compressed Encodings. CRYPTO 1983: 209-230 - Dorothy E. Denning:
Field Encryption and Authentication. CRYPTO 1983: 231-247 - James A. Reeds, Neil J. A. Sloane:
Shift-Register Synthesis (Modula m). CRYPTO 1983: 249 - Joel E. Sachs, Shimshon Berkovits:
Probabilistic Analysis and Performance Modelling of the 'Swedish' Algorithm and Modifications. CRYPTO 1983: 253-273 - Taher El Gamal:
A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p²). CRYPTO 1983: 275-292 - Rudolf Lidl, Winfried B. Müller:
Permutation Polynomials in RSA-Cryptosystems. CRYPTO 1983: 293-301 - Helmut Jürgensen, D. E. Matthew:
Some Results on the Information Theoretic Analysis of Cryptosystems. CRYPTO 1983: 303-356 - Bahaa W. Fam:
Improving the Security of Exponential Key Exchange. CRYPTO 1983: 359-368 - Umesh V. Vazirani, Vijay V. Vazirani:
RSA Bits are 732+epsilon Secure. CRYPTO 1983: 369-375 - Donald W. Davies:
Use of the 'Signature Token' to Create a Negotiable Document. CRYPTO 1983: 377-382 - Shimon Even, Oded Goldreich:
Electronic Wallet. CRYPTO 1983: 383-386 - David Chaum:
Design Concepts for Tamper Responding Systems. CRYPTO 1983: 387-392
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.