Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
List of Publications
year
venue
title
pages
1981
crypto
Implementation of a Hybrid {RSA/DES} Key Management System
83
1981
crypto
Results on Sampling-based Scrambling for Secure Speech Communication
115-119
1981
crypto
Nonlinear Feedback Shift Register Sequences
121-123
1981
crypto
Subtractive Encryptors - Alternatives to the DES
42-52
1981
crypto
Security Mechanisms in Electronic Cards
109
1981
crypto
Limitations on the Use of Encryption to Enforce Mandatory Security
130-134
1981
crypto
Some Thoughts on Speech Encryption
120
1981
crypto
Current Market: Products, Costs, Trends
110-114
1981
crypto
The Import/Export Dilemma
135-137
1981
crypto
Verification by Anonymous Monitors
138-139
1981
crypto
Towards a Design Procedure for Cryptosecure Substitution Boxes
53
1981
crypto
An Optimally Secure Relativized Cryptosystem
54-58
1981
crypto
Digital Signature Scheme for Computer Communication Networks
65-70
1981
crypto
On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis
2-6
1981
crypto
High-Speed Hardware Implementation of the Knapsack Cipher
16
1981
crypto
A General Public Key System
140-141
1981
crypto
Discussion of Adleman's Subexponential Algorithm for Computing Discrete Logarithms
142-147
1981
crypto
Key Management from a Security Viewpoint
82
1981
crypto
A Password Extension for Improved Human Factors
81
1981
crypto
Coin Flipping by Telephone
11-15
1981
crypto
Some Comments on the Knapsack Problem
20-24
1981
crypto
Software Protection Using ``Communal Key Cryptosystems''
79
1981
crypto
Primality Testing
10
1981
crypto
Scrambling and Randomization
59-63
1981
crypto
Variant of a Public Key Cryptosystem Based on Goppa Codes
25-30
1981
crypto
Memo: A Hybrid Approach to Encrypted Electronic Mail
64
1981
crypto
Time-Memory-Processor Tradeoffs
7-9
1981
crypto
Advances in Cryptology: A report on CRYPTO 81
156
1981
crypto
A Polynomial Time Solution for Compact Knapsacks
17-19
1981
crypto
One-way Sequence for Transaction Verification
38
1981
crypto
The Generation of Cryptographically Strong Pseudo-Random Sequences
1
1981
crypto
Some Regular Properties of the DES
41
1981
crypto
A System for Point-of-Sale or Access User Authentication and Identification
31-37
1981
crypto
Some Cryptographic Techniques for File Protection
80
1981
crypto
Cryptography, the Next Two Decades
84-108
1981
crypto
DES '81: An Update
39-40
1981
crypto
National Security and Commercial Security: Division of Responsibility
154-156
1981
crypto
Local Network Cryptosystem Architecture
73-78
1981
crypto
Evaluating Relative Security of Commercial ComSec Devices
124-129
1981
crypto
Protocol for Signing Contracts
148-153
1981
crypto
The Design and Analysis of Cryptographic Protocols
71-72