year |
venue |
title |
pages |
1984 | crypto | An LSI Random Number Generator (RNG) | 203-230 |
1984 | crypto | An LSI Digital Encryption Processor (DEP) | 115-143 |
1984 | crypto | Fair Exchange of Secrets | 434-438 |
1984 | crypto | The History of Book Ciphers | 101-113 |
1984 | crypto | Sequence Complexity as a Test for Cryptographic Systems | 468-474 |
1984 | crypto | Efficient and Secure Pseudo-Random Number Generation | 193-202 |
1984 | crypto | Poker Protocols | 454-464 |
1984 | crypto | A Public Key Cryptosystem Based on the Word Problem | 19-36 |
1984 | crypto | A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms | 10-18 |
1984 | crypto | Some Public Key Crypto-Functions as Intractable as Factorization | 66-70 |
1984 | crypto | Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract) | 439-453 |
1984 | crypto | RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure | 303-313 |
1984 | crypto | On the Cryptographic Applications of Random Functions | 276-288 |
1984 | crypto | New Secret Codes Can Prevent a Computerized Big Brother (Abstract) | 432-433 |
1984 | crypto | A "Paradoxical'"Solution to the Signature Problem (Abstract) | 467 |
1984 | crypto | How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems | 481-485 |
1984 | crypto | Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings | online |
1984 | crypto | On Rotation Group and Encryption of Analog Signals | 95-100 |
1984 | crypto | Breaking Iterated Knapsacks | 342-358 |
1984 | crypto | Efficient Signature Schemes Based on Polynomial Equations | 37-46 |
1984 | crypto | Computing Logarithms in GF(2n) | 73-82 |
1984 | crypto | Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects | 314-338 |
1984 | crypto | Efficient Hardware Implementation of the DES | 147-173 |
1984 | crypto | A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields | 54-65 |
1984 | crypto | Security of Ramp Schemes | 242-268 |
1984 | crypto | A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation | 174-190 |
1984 | crypto | Key Management for Secure Electronic Funds Transfer in a Retail Environment | 401-410 |
1984 | crypto | DES Has No Per Round Linear Factors | 377-389 |
1984 | crypto | A Fast Pseudo Random Permutation Generator With Applications to Cryptology | 269-275 |
1984 | crypto | An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information | 289-302 |
1984 | crypto | Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract) | 339-341 |
1984 | crypto | A Prototype Encryption System Using Public Key | 3-9 |
1984 | crypto | Generalized Linear Threshold Scheme | 231-241 |
1984 | crypto | Identity-Based Cryptosystems and Signature Schemes | 47-53 |
1984 | crypto | A Message Authenticator Algorithm Suitable for A Mainframe Computer | 393-400 |
1984 | crypto | Efficient Hardware and Software Implementations for the DES | 144-146 |
1984 | crypto | An Update on Factorization at Sandia National Laboratories (Abstract) | 114 |
1984 | crypto | Wyner's Analog Encryption Scheme: Results of a Simulation | 83-94 |
1984 | crypto | Authentication Theory/Coding Theory | 411-431 |
1984 | crypto | An Update on Quantum Cryptography | 475-480 |
1984 | crypto | Dependence of Output on Input in DES: Small Avalanche Characteristics | 359-376 |
1984 | eurocrypt | A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques | 446-454 |
1984 | eurocrypt | RSA-Bits are 0.5 + epsilon Secure | 113-126 |
1984 | eurocrypt | On the Use of the Binary Multiplying Channel in a Private Communication System | 339-348 |
1984 | eurocrypt | On Cryptosystems Based on Polynomials and Finite Fields | 10-15 |
1984 | eurocrypt | Time-division Multiplexing Scramblers: Selecting Permutations and Testing the Systems | 399-415 |
1984 | eurocrypt | An Optimal Class of Symmetric Key Generation Systems | 335-338 |
1984 | eurocrypt | Bull CP8 Smart Card Uses in Cryptology | 464-469 |
1984 | eurocrypt | On the Linear Complexity of Cascaded Sequences | 99-109 |
1984 | eurocrypt | Linear Ciphers and Random Sequence Generators with Multiple Clocks | 74-87 |
1984 | eurocrypt | Wire-Tap Channel II | 33-50 |
1984 | eurocrypt | On the Number of Close-and-Equal Pairs of Bits in a String | 127-141 |
1984 | eurocrypt | On Concurrent Identification Protocols | 387-396 |
1984 | eurocrypt | Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers | 93-98 |
1984 | eurocrypt | Discrete Logarithms in Finite Fields and Their Cryptographic Significance | 224-314 |
1984 | eurocrypt | A New Trapdoor Knapsack Public-Key Cryptosystem | 150-158 |
1984 | eurocrypt | Strong Primes are Easy to Find | 216-223 |
1984 | eurocrypt | An Encryption and Authentication Procedure for Telesurveillance Systems | 437-445 |
1984 | eurocrypt | Smart Card Applications in Security and Data Protection | 459-463 |
1984 | eurocrypt | Estimation of Some Encryption Functions Implemented into Smart Cards | 470-479 |
1984 | eurocrypt | Smart Cards and Conditional Access | 480-489 |
1984 | eurocrypt | User Functions for the Generation and Distribution of Encipherment Keys | 317-334 |
1984 | eurocrypt | Non-Linear Non-Commutative Functions for Data Integrity | 25-32 |
1984 | eurocrypt | Algebraical Structures of Cryptographic Transformations | 16-24 |
1984 | eurocrypt | Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings | online |
1984 | eurocrypt | The Quadratic Sieve Factoring Algorithm | 169-182 |
1984 | eurocrypt | Encryption and Key Manaagement for the ECS Satellite Service | 426-436 |
1984 | eurocrypt | Security of Transportable Computerized Files | 416-425 |
1984 | eurocrypt | Equivolcations for Homophonic Ciphers | 51-61 |
1984 | eurocrypt | Secrecy and Privacy in a Local Area Network Environment | 349-363 |
1984 | eurocrypt | RSA Chips (Past/Present/Future) | 159-165 |
1984 | eurocrypt | A Provably Secure Oblivious Transfer Protocol | 379-386 |
1984 | eurocrypt | Propagation Characteristics of the DES | 62-73 |
1984 | eurocrypt | Status Report on Factoring (At the Sandia National Laboratories) | 183-215 |
1984 | eurocrypt | Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme | 142-149 |
1984 | eurocrypt | Cryptology and Complexity Theories | 3-9 |
1984 | eurocrypt | The Stop-and-Go Generator | 88-92 |
1984 | eurocrypt | The Subliminal Channel and Digital Signature | 364-378 |