Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Advances in Cryptology: A Report on CRYPTO 81
Page
Title
1
The Generation of Cryptographically Strong Pseudo-Random Sequences
2-6
On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis
7-9
Time-Memory-Processor Tradeoffs
10
Primality Testing
11-15
Coin Flipping by Telephone
16
High-Speed Hardware Implementation of the Knapsack Cipher
17-19
A Polynomial Time Solution for Compact Knapsacks
20-24
Some Comments on the Knapsack Problem
25-30
Variant of a Public Key Cryptosystem Based on Goppa Codes
31-37
A System for Point-of-Sale or Access User Authentication and Identification
38
One-way Sequence for Transaction Verification
39-40
DES '81: An Update
41
Some Regular Properties of the DES
42-52
Subtractive Encryptors - Alternatives to the DES
53
Towards a Design Procedure for Cryptosecure Substitution Boxes
54-58
An Optimally Secure Relativized Cryptosystem
59-63
Scrambling and Randomization
64
Memo: A Hybrid Approach to Encrypted Electronic Mail
65-70
Digital Signature Scheme for Computer Communication Networks
71-72
The Design and Analysis of Cryptographic Protocols
73-78
Local Network Cryptosystem Architecture
79
Software Protection Using ``Communal Key Cryptosystems''
80
Some Cryptographic Techniques for File Protection
81
A Password Extension for Improved Human Factors
82
Key Management from a Security Viewpoint
83
Implementation of a Hybrid {RSA/DES} Key Management System
84-108
Cryptography, the Next Two Decades
109
Security Mechanisms in Electronic Cards
110-114
Current Market: Products, Costs, Trends
115-119
Results on Sampling-based Scrambling for Secure Speech Communication
120
Some Thoughts on Speech Encryption
121-123
Nonlinear Feedback Shift Register Sequences
124-129
Evaluating Relative Security of Commercial ComSec Devices
130-134
Limitations on the Use of Encryption to Enforce Mandatory Security
135-137
The Import/Export Dilemma
138-139
Verification by Anonymous Monitors
140-141
A General Public Key System
142-147
Discussion of Adleman's Subexponential Algorithm for Computing Discrete Logarithms
148-153
Protocol for Signing Contracts
154-156
National Security and Commercial Security: Division of Responsibility