Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings
Page
Title
3-9
A Prototype Encryption System Using Public Key
10-18
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
19-36
A Public Key Cryptosystem Based on the Word Problem
37-46
Efficient Signature Schemes Based on Polynomial Equations
47-53
Identity-Based Cryptosystems and Signature Schemes
54-65
A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields
66-70
Some Public Key Crypto-Functions as Intractable as Factorization
73-82
Computing Logarithms in GF(2
n
)
83-94
Wyner's Analog Encryption Scheme: Results of a Simulation
95-100
On Rotation Group and Encryption of Analog Signals
101-113
The History of Book Ciphers
114
An Update on Factorization at Sandia National Laboratories (Abstract)
115-143
An LSI Digital Encryption Processor (DEP)
144-146
Efficient Hardware and Software Implementations for the DES
147-173
Efficient Hardware Implementation of the DES
174-190
A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation
193-202
Efficient and Secure Pseudo-Random Number Generation
203-230
An LSI Random Number Generator (RNG)
231-241
Generalized Linear Threshold Scheme
242-268
Security of Ramp Schemes
269-275
A Fast Pseudo Random Permutation Generator With Applications to Cryptology
276-288
On the Cryptographic Applications of Random Functions
289-302
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
303-313
RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure
314-338
Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects
339-341
Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract)
342-358
Breaking Iterated Knapsacks
359-376
Dependence of Output on Input in DES: Small Avalanche Characteristics
377-389
DES Has No Per Round Linear Factors
393-400
A Message Authenticator Algorithm Suitable for A Mainframe Computer
401-410
Key Management for Secure Electronic Funds Transfer in a Retail Environment
411-431
Authentication Theory/Coding Theory
432-433
New Secret Codes Can Prevent a Computerized Big Brother (Abstract)
434-438
Fair Exchange of Secrets
439-453
Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract)
454-464
Poker Protocols
467
A "Paradoxical'"Solution to the Signature Problem (Abstract)
468-474
Sequence Complexity as a Test for Cryptographic Systems
475-480
An Update on Quantum Cryptography
481-485
How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems