Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Links to individual LNCS volumes are
here
. Unfortunately FSE 2013 data was never captured.
Advances in Cryptology: Proceedings of CRYPTO '82
Page
Title
3-13
Fast Computation of Discrete Logarithms in GF(q)
15-19
Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2
^{p}
)
21-37
A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem
39-50
Infinite Structures in Information Theory
51-60
A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography
61-78
Comparison of Two Pseudo-Random Number Generators
79-86
On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys
89-96
Some Regular Properties of the `Data Encryption Standard' Algorithm
97-98
The Average Cycle Size of the Key Stream in Output Feedback Encipherment
99-127
Analysis of Certain Aspects of Output Feedback Mode
129-131
Drainage and the DES
133-137
Security of a Keystream Cipher with Secret Initial Value
139-143
Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes
145-163
Randomized Encryption Techniques
167-175
On the Security of Multi-Party Protocols in Distributed Systems
177-186
On the Security of Ping-Pong Protocols
187-197
The Use of Public-Key Cryptography for Signing Checks
199-203
Blind Signatures for Untraceable Payments
205-210
A Randomized Protocol for Signing Contracts
211-215
On Signatures and Authentication
219-229
Cryptographic Protection of Personal Data Cards
231-236
Non-Public Key Distribution
237-249
Cryptographic Solution to a Multilevel Security Problem
251-258
Local Network Cryptosystem Architecture: Access Control
259-265
Implementing an Electronic Notary Public
267-275
Quantum Cryptography, or Unforgeable Subway Tokens
279-288
A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem
289-301
A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems
303-308
On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem
311-313
Long Key Variants of DES
315
On the Security of Multi-Party Ping-Pong Protocols
317-319
Inferring a Sequence Produced by a Linear Congruence
321-322
Key Reconstruction
323-326
Nondeterministic Cryptography
327
A Short Report on the RSA Chip