What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1984
Year
Venue
Title
1984
CRYPTO
A "Paradoxical'"Solution to the Signature Problem (Abstract)
Shafi Goldwasser
Silvio Micali
Ronald L. Rivest
1984
CRYPTO
A Fast Pseudo Random Permutation Generator With Applications to Cryptology
Selim G. Akl
Henk Meijer
1984
CRYPTO
A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields
Benny Chor
Ronald L. Rivest
1984
CRYPTO
A Message Authenticator Algorithm Suitable for A Mainframe Computer
Donald W. Davies
1984
CRYPTO
A Prototype Encryption System Using Public Key
S. C. Serpell
C. B. Brookson
B. L. Clark
1984
CRYPTO
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
Taher El Gamal
1984
CRYPTO
A Public Key Cryptosystem Based on the Word Problem
Neal R. Wagner
Marianne R. Magyarik
1984
CRYPTO
A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation
Norman Proctor
1984
CRYPTO
Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings
1984
CRYPTO
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
Manuel Blum
Shafi Goldwasser
1984
CRYPTO
An LSI Digital Encryption Processor (DEP)
R. C. Fairfield
A. Matusevich
J. Plany
1984
CRYPTO
An LSI Random Number Generator (RNG)
R. C. Fairfield
R. L. Mortenson
K. B. Coulthart
1984
CRYPTO
An Update on Factorization at Sandia National Laboratories (Abstract)
James A. Davis
Diane B. Holdridge
1984
CRYPTO
An Update on Quantum Cryptography
Charles H. Bennett
Gilles Brassard
1984
CRYPTO
Authentication Theory/Coding Theory
Gustavus J. Simmons
1984
CRYPTO
Breaking Iterated Knapsacks
Ernest F. Brickell
1984
CRYPTO
Computing Logarithms in GF(2<sup>n</sup>)
Ian F. Blake
Ronald C. Mullin
Scott A. Vanstone
1984
CRYPTO
Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract)
Alan G. Konheim
1984
CRYPTO
Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract)
Moti Yung
1984
CRYPTO
Dependence of Output on Input in DES: Small Avalanche Characteristics
Yvo Desmedt
Jean-Jacques Quisquater
Marc Davio
1984
CRYPTO
DES Has No Per Round Linear Factors
James A. Reeds
J. L. Manferdelli
1984
CRYPTO
Efficient and Secure Pseudo-Random Number Generation
Umesh V. Vazirani
Vijay V. Vazirani
1984
CRYPTO
Efficient Hardware and Software Implementations for the DES
Marc Davio
Yvo Desmedt
Jo Goubert
Frank Hoornaert
Jean-Jacques Quisquater
1984
CRYPTO
Efficient Hardware Implementation of the DES
Frank Hoornaert
Jo Goubert
Yvo Desmedt
1984
CRYPTO
Efficient Signature Schemes Based on Polynomial Equations
H. Ong
Claus-Peter Schnorr
Adi Shamir
1984
CRYPTO
Fair Exchange of Secrets
Tom Tedrick
1984
CRYPTO
Generalized Linear Threshold Scheme
Suresh C. Kothari
1984
CRYPTO
How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems
David Chaum
1984
CRYPTO
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
1984
CRYPTO
Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects
G. R. Blakley
1984
CRYPTO
Key Management for Secure Electronic Funds Transfer in a Retail Environment
Henry Beker
Michael Walker
1984
CRYPTO
New Secret Codes Can Prevent a Computerized Big Brother (Abstract)
David Chaum
1984
CRYPTO
On Rotation Group and Encryption of Analog Signals
Su-Shing Chen
1984
CRYPTO
On the Cryptographic Applications of Random Functions
Oded Goldreich
Shafi Goldwasser
Silvio Micali
1984
CRYPTO
Poker Protocols
Steven Fortune
Michael Merritt
1984
CRYPTO
RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure
Benny Chor
Oded Goldreich
1984
CRYPTO
Security of Ramp Schemes
G. R. Blakley
Catherine Meadows
1984
CRYPTO
Sequence Complexity as a Test for Cryptographic Systems
A. K. Leung
Stafford E. Tavares
1984
CRYPTO
Some Public Key Crypto-Functions as Intractable as Factorization
Hugh C. Williams
1984
CRYPTO
The History of Book Ciphers
Albert C. Leighton
Stephen M. Matyas
1984
CRYPTO
Wyner's Analog Encryption Scheme: Results of a Simulation
Burton S. Kaliski Jr.