What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1983
Year
Venue
Title
1983
CRYPTO
A Layered Broadcast Cryptographic System
M. E. Spencerr
S. E. Travares
1983
CRYPTO
A Simple Protocol for Signing Contracts
Oded Goldreich
1983
CRYPTO
A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p²)
Taher El Gamal
1983
CRYPTO
Advances in Cryptology: Proceedings of CRYPTO '83
David Chaum
1983
CRYPTO
An Overview of Factoring
Hugh C. Williams
1983
CRYPTO
Analytical Characteristics of the DES
Marc Davio
Yvo Desmedt
Marc Fosseprez
René Govaerts
Jan Hulsbosch
Patrik Neutjens
Philippe Piret
Jean-Jacques Quisquater
Joos Vandewalle
Pascal Wouters
1983
CRYPTO
Blind Signature System
David Chaum
1983
CRYPTO
Design Concepts for Tamper Responding Systems
David Chaum
1983
CRYPTO
Electronic Wallet
Shimon Even
Oded Goldreich
1983
CRYPTO
Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems
Ernest F. Brickell
J. C. Lagarias
Andrew M. Odlyzko
1983
CRYPTO
Factoring Numbers on the Massively Parallel Computer
Marvin C. Wunderlich
1983
CRYPTO
Factorization Using the Quadratic Sieve Algorithm
James A. Davis
Diane B. Holdridge
1983
CRYPTO
Field Encryption and Authentication
Dorothy E. Denning
1983
CRYPTO
How to Exchange Half a Bit
Tom Tedrick
1983
CRYPTO
Improving the Security of Exponential Key Exchange
Bahaa W. Fam
1983
CRYPTO
Knapsack Public Key Cryptosystems and Diophantine Approximation
J. C. Lagarias
1983
CRYPTO
New Ideas for Factoring Large Integers
Carl Pomerance
J. W. Smith
Samuel S. Wagstaff
1983
CRYPTO
On the Power of Cascade Ciphers
Shimon Even
Oded Goldreich
1983
CRYPTO
On the Security of Compressed Encodings
Selim G. Akl
1983
CRYPTO
Permutation Polynomials in RSA-Cryptosystems
Rudolf Lidl
Winfried B. Müller
1983
CRYPTO
Probabilistic Analysis and Performance Modelling of the `Swedish' Algorithm and Modifications
Joel E. Sachs
Shimshon Berkovits
1983
CRYPTO
Producing a One-Way Hash Function from DES
Robert S. Winternitz
1983
CRYPTO
Reducibility Among Protocols
Manuel Blum
Umesh V. Vazirani
Vijay V. Vazirani
1983
CRYPTO
RSA Bits are 732+epsilon Secure
Umesh V. Vazirani
Vijay V. Vazirani
1983
CRYPTO
Shift-Register Synthesis (Modula m)
James A. Reeds
N. J. A. Sloane
1983
CRYPTO
Signatures through Approximate Representation by Quadratic Forms
H. Ong
Claus-Peter Schnorr
1983
CRYPTO
Solving Low Density Knapsacks
Ernest F. Brickell
1983
CRYPTO
Some Results on the Information Theoretic Analysis of Cryptosystems
Helmut Jürgensen
D. E. Matthew
1983
CRYPTO
The Prisoners' Problem and the Subliminal Channel
Gustavus J. Simmons
1983
CRYPTO
Use of the `Signature Token' to Create a Negotiable Document
Donald W. Davies