What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1982
Year
Venue
Title
1982
CRYPTO
A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography
Ernest F. Brickell
1982
CRYPTO
A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem
Adi Shamir
1982
CRYPTO
A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems
Ernest F. Brickell
James A. Davis
Gustavus J. Simmons
1982
CRYPTO
A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem
Ravi Janardan
K. B. Lakshmanan
1982
CRYPTO
A Randomized Protocol for Signing Contracts
Shimon Even
Oded Goldreich
Abraham Lempel
1982
CRYPTO
A Short Report on the RSA Chip
Ronald L. Rivest
1982
CRYPTO
Advances in Cryptology: Proceedings of CRYPTO '82
Ronald L. Rivest
Alan T. Sherman
David Chaum
1982
CRYPTO
Analysis of Certain Aspects of Output Feedback Mode
Robert R. Jueneman
1982
CRYPTO
Blind Signatures for Untraceable Payments
David Chaum
1982
CRYPTO
Comparison of Two Pseudo-Random Number Generators
Lenore Blum
Manuel Blum
Mike Shub
1982
CRYPTO
Cryptographic Protection of Personal Data Cards
Christian Müller-Schloer
Neal R. Wagner
1982
CRYPTO
Cryptographic Solution to a Multilevel Security Problem
Selim G. Akl
Peter D. Taylor
1982
CRYPTO
Drainage and the DES
Martin E. Hellman
Justin M. Reyneri
1982
CRYPTO
Fast Computation of Discrete Logarithms in GF(q)
Martin E. Hellman
Justin M. Reyneri
1982
CRYPTO
Implementing an Electronic Notary Public
Leonard M. Adleman
1982
CRYPTO
Inferring a Sequence Produced by a Linear Congruence
Joan B. Plumstead
1982
CRYPTO
Infinite Structures in Information Theory
G. R. Blakley
Laif Swanson
1982
CRYPTO
Key Reconstruction
Michael Merritt
1982
CRYPTO
Local Network Cryptosystem Architecture: Access Control
Thomas A. Berson
1982
CRYPTO
Long Key Variants of DES
Thomas A. Berson
1982
CRYPTO
Non-Public Key Distribution
Rolf Blom
1982
CRYPTO
Nondeterministic Cryptography
Carl Nicolai
1982
CRYPTO
On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem
Leonard M. Adleman
1982
CRYPTO
On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys
Gilles Brassard
1982
CRYPTO
On Signatures and Authentication
Shafi Goldwasser
Silvio Micali
Andrew Chi-Chih Yao
1982
CRYPTO
On the Security of Multi-Party Ping-Pong Protocols
Shimon Even
Oded Goldreich
1982
CRYPTO
On the Security of Multi-Party Protocols in Distributed Systems
Danny Dolev
Avi Wigderson
1982
CRYPTO
On the Security of Ping-Pong Protocols
Danny Dolev
Shimon Even
Richard M. Karp
1982
CRYPTO
Quantum Cryptography, or Unforgeable Subway Tokens
Charles H. Bennett
Gilles Brassard
Seth Breidbard
Stephen Wiesner
1982
CRYPTO
Randomized Encryption Techniques
Ronald L. Rivest
Alan T. Sherman
1982
CRYPTO
Security of a Keystream Cipher with Secret Initial Value
Robert S. Winternitz
1982
CRYPTO
Some Regular Properties of the `Data Encryption Standard' Algorithm
Donald W. Davies
1982
CRYPTO
Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2<sup>p</sup>)
Ernest F. Brickell
Judy H. Moore
1982
CRYPTO
The Average Cycle Size of the Key Stream in Output Feedback Encipherment
Donald W. Davies
Graeme I. P. Parkin
1982
CRYPTO
The Use of Public-Key Cryptography for Signing Checks
Luc Longpré
1982
CRYPTO
Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes
G. M. Avis
Stafford E. Tavares