Crypto 81 proceedings
The proceedings of Crypto 81 was published as a UCSB Tech Report. These papers were not refereed, and this predates the existence of IACR. The front matter with preface and table of contents is available here. The cover sheet is also available.
For those who are curious, a list of people registered for the conference is available here.
Session A: Theory & Implementation
Ron Rivest, MIT, Chairman
- The Generation or Cryptographically Strong Pseudo-Random Sequences, Adi Shamir, Weitzmann Institute (Israel) (Metadata)
- On the Necessity or Exhaustive Search for System-Invariant Cryptanalysis, Martin E. Hellman, Ehud Karnin, and Justin Reyneri, Stanford Univ. (Metadata)
- Time-Memory-Processor Tradeoffs, Hamid Amirazizi and Martin E. Hellman, Stanford Univ. (Metadata)
- Primality Testing, Leonard Adleman, USC (Metadata)
- Coin Flipping by Telephone, Manuel Blum, UC Berkeley (Metadata)
- High-Speed Hardware Implementation of the Knapsack Cipher, Paul S. Henry and R. D. Nash, Bell Labs (Metadata)
- A Polynomial Time Solution for Compact Knapsacks, Hamid Amirazizi, Ehud Karnin, and Justin Reyneri, Stanford Univ. (Metadata)
- Some Comments on the Knapsack Problem, Ingemar Ingemarsson, Univ. of Linkoping (Sweden) (Metadata)
- Variant ot a Public Key Cryptosystem based on Goppa codes, John P. Jordan, Bell Labs (Metadata)
Session B: Algorithms, Techniques, & Funding
Ralph Merkle, ELXSI Int'l, Chairman
- A System for Point-of-Sale or Access User Authentication and Identification, Gus Simmons, Sandia Corp. (Metadata)
- One-way Sequence for Transaction Verification, Alan G. Konheim, Univ. Calif.,Santa Barbara (Metadata)
- DES '81l: An Update, Miles E. Smid, NBS (Metadata)
- Some Regular Properties of the DES, Donald W. Davies, National Physical Lab (England) (Metadata)
- Subtractive Encryptors - Alternatives to the DES, Don R. Morrison, Univ. New Mexico (Metadata)
- Towards a Design Procedure for Cryptosecure Substitution Boxes, J. A. Gordon, Hatfield Polytechnic (England) (Metadata)
- An Optimally Secure Relativized Cryptosystem Gilles Brassard, Univ. de Montreal (Metadata)
- Scrambling and Randomization, Subhash C. Kak, Louisiana State Univ. (Metadata)
- A Discussion ot NSA Program OCREAE, Larry Hatch, NSA
Session C Computers, Networks, Key Management
Steve Kent, BBN, Chairman
- Memo: A Hybrid Approach to Encrypted Electronic Mail, Brian P. Schanning, and J. Kowalchuk, Mitre (Metadata)
- Digital Signature Scneme for Computer Communication Networks, Henk Meijer and , Selim G. Akl, Queen's University (Metadata)
- The Design and Analysisof Cryptographic Protocols, Richard A. DeMillo, Nancy A. Lynch, and Michael Merritt, Georgia Tech (Metadata)
- Local Network Cryptosystem Architecture Thomas A. Berson, Sytek,Inc. (Metadata)
- Software Protection Using "Communal Key Cryptosystems" George B. Purdy, Texas A&M University, Gustavus J. Simmons, Sandia, James Studier, Univ. Illinois (Metadata)
- Some Cryptograpnic Techniques for File Protection, Stephen T. Kent, BBN (Metadata)
- A Password Extension for Improved Human Factors Sig Porter, NCR (Metadata)
- Key Management from a Security Viewpoint G. R. Blakley, Texas A&M University (Metadata)
- Implementation of a Hybrid RSA/DES Key Management System, Y. Alfred Lau, M/A-COM , Tom McPherson (Metadata)
Session D Applications and Issues
Steve Weinstein, American Express, Chairman
- Cryptography, the Next Two Decades, Whitfield Diffie, BNR (Metadata)
- Security Mechanisms in Electronic Cards Stephen B. Weinstein, American Express (Metadata)
- Current Market: Products, Costs, Trends, J. Michael Nye, Marketing Consultants Int'l (Metadata)
- Results on Sampling-based Scrambling for Secure Speech Cummunication, Lin-Shan Lee and , Ger-chih Chow, National Taiwan Univ. (Metadata)
- Some Tnoughts on Speech Encryption A. D. Wyner, Bell Labs (Metadata)
- Nonlinear Feedback Shift Register Sequences H. J. Beker, Racal-Milgo (England) (Metadata)
- Evaluating Relative Security of Commercial ComSec Devices, Albert L. Lang and Janet T. Vasek, Booz, Allen & Hamilton (Metadata)
- Limitations on the Use of Encryption to Enforce Mandatory Security, Morrie Gasser, Mitre (Metadata)
- The Import/Export Dilemma, J. Michael Nye, (Marketing Consultants Int'l (Metadata)
Rump Session
Paul S. Henry, Bell Labs, Chairman
- Verification by Anonymous Monitors, David Chaum, Univ. California. Santa Barbara (Metadata)
- Progress in Public Key Cryptography in Great Britain, Martin Kochanski, Telesecurity Ltd. (no paper)
- A General Public Key System Ernst Henze, Univ. Braunschweig (Ww. Germany) (Metadata)
- Discussion ot Adleman's Subexponential Algorithm for Computing Discrete Logarithms, Tore Herlestam, Univ. Lund (Sweden) (Metadata)
- Theorem concerning Pseudo-Random Sequences, Adi Shamir (no paper)
- Protocol for Signing Contracts, Shimon Even, Technion (Israel) (Metadata)
- Ill-Formed Tuoughts Concerning Oblivious Transfer, Ron Rivest, MIT (no paper)
Panel Discussion
National Security and Commercial Security:
Division of Responsibility,
Whitfield Diffie, BNR (Moderator),
Melville Klein, NSA,
Michael L. Dertouzos, MIT,
Andrew Gleason, Harvard
Dean Smith
(Metadata)