Search
International Association for Cryptologic Research
What's new
Archive
Paper awards
Videos
Authors
Coauthors
By year
By venue
All Committees
Most Committees
Report errors
About
List of Publications
year
venue
title
pages
1982
crypto
Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes
139-143
1982
crypto
Cryptographic Solution to a Multilevel Security Problem
237-249
1982
crypto
Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2
p
)
15-19
1982
crypto
A Randomized Protocol for Signing Contracts
205-210
1982
crypto
Cryptographic Protection of Personal Data Cards
219-229
1982
crypto
Quantum Cryptography, or Unforgeable Subway Tokens
267-275
1982
crypto
On the Security of Multi-Party Protocols in Distributed Systems
167-175
1982
crypto
The Use of Public-Key Cryptography for Signing Checks
187-197
1982
crypto
Security of a Keystream Cipher with Secret Initial Value
133-137
1982
crypto
On Signatures and Authentication
211-215
1982
crypto
Nondeterministic Cryptography
323-326
1982
crypto
On the Security of Multi-Party Ping-Pong Protocols
315
1982
crypto
Blind Signatures for Untraceable Payments
199-203
1982
crypto
On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys
79-86
1982
crypto
A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography
51-60
1982
crypto
Key Reconstruction
321-322
1982
crypto
The Average Cycle Size of the Key Stream in Output Feedback Encipherment
97-98
1982
crypto
Inferring a Sequence Produced by a Linear Congruence
317-319
1982
crypto
Non-Public Key Distribution
231-236
1982
crypto
Fast Computation of Discrete Logarithms in GF(q)
3-13
1982
crypto
Drainage and the DES
129-131
1982
crypto
A Short Report on the RSA Chip
327
1982
crypto
Implementing an Electronic Notary Public
259-265
1982
crypto
On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem
303-308
1982
crypto
Advances in Cryptology: Proceedings of CRYPTO '82
online
1982
crypto
Analysis of Certain Aspects of Output Feedback Mode
99-127
1982
crypto
A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem
279-288
1982
crypto
Some Regular Properties of the `Data Encryption Standard' Algorithm
89-96
1982
crypto
Randomized Encryption Techniques
145-163
1982
crypto
Comparison of Two Pseudo-Random Number Generators
61-78
1982
crypto
On the Security of Ping-Pong Protocols
177-186
1982
crypto
A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems
289-301
1982
crypto
Local Network Cryptosystem Architecture: Access Control
251-258
1982
crypto
Long Key Variants of DES
311-313
1982
crypto
A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem
21-37
1982
crypto
Infinite Structures in Information Theory
39-50
1982
eurocrypt
Cryptonalysis of the Data Encryption Standard by the Method of Formal Coding
235-255
1982
eurocrypt
Analog Speech security Systems
130-146
1982
eurocrypt
Finite Semigroups and the RSA-Cryptosystem
353-369
1982
eurocrypt
Trapdoors in Knapsack Cryptosystems
316-322
1982
eurocrypt
The Rating of Understanding in Secure Voice Communication Systems
157-163
1982
eurocrypt
A voice Scrambling System for Testing and Demonstration
147-156
1982
eurocrypt
Communication Security in Remote controlled Computer Systems
219-227
1982
eurocrypt
Are Big S-Boxes Best?
257-262
1982
eurocrypt
Multiplexed Sequences: Some Properties of the Minimum Polynomial
189-206
1982
eurocrypt
Analysis of Multiple Access Channel using Multiple Level FSK
165-172
1982
eurocrypt
Analog Scrambling by the General Fast Fourier Transform
173-178
1982
eurocrypt
On Using Prime Polynomials in Crypto Generators
207-216
1982
eurocrypt
Stream Ciphers
181-188
1982
eurocrypt
Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem
289-306
1982
eurocrypt
Enigma Variations
65-68
1982
eurocrypt
Is the RSA Scheme Safe?
325-329
1982
eurocrypt
Privacy and Data Protection in Medicine
228-232
1982
eurocrypt
A new Algorithm for the Solution of the Knapsack Problem
309-315
1982
eurocrypt
Cryptoanalysis of a Kryha Machine
49-64
1982
eurocrypt
The average Cycle size of the Key-Stream in Output Feedback Encipherment
263-279
1982
eurocrypt
Jean-Marie Goethals, Jean-Jacques Quisquater: Authentication Procedures
283-288
1982
eurocrypt
Introduction
1-30
1982
eurocrypt
How to Share a Secret?
371-375
1982
eurocrypt
Cryptology - Methods and Maxims
31-48
1982
eurocrypt
Encrypting by Random Rotations
71-128
1982
eurocrypt
Ein Effizienzvergleich der Factorisierungsverfahren von Morrison-Brillhart und Schroeppel
331-351