


default search action
3rd CRYPTO 1983
- David Chaum:

Advances in Cryptology, Proceedings of CRYPTO '83, Santa Barbara, California, USA, August 21-24, 1983. Plenum Press, New York 1984 - J. C. Lagarias:

Knapsack Public Key Cryptosystems and Diophantine Approximation. CRYPTO 1983: 3-23 - Ernest F. Brickell:

Solving Low Density Knapsacks. CRYPTO 1983: 25-37 - Ernest F. Brickell, J. C. Lagarias, Andrew M. Odlyzko:

Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems. CRYPTO 1983: 39-42 - Shimon Even, Oded Goldreich:

On the Power of Cascade Ciphers. CRYPTO 1983: 43-50 - Gustavus J. Simmons:

The Prisoners' Problem and the Subliminal Channel. CRYPTO 1983: 51-67 - Hugh C. Williams:

An Overview of Factoring. CRYPTO 1983: 71-80 - Carl Pomerance, Jeffrey W. Smith, Samuel S. Wagstaff Jr.:

New Ideas for Factoring Large Integers. CRYPTO 1983: 81-85 - Marvin C. Wunderlich:

Factoring Numbers on the Massively Parallel Computer. CRYPTO 1983: 87-102 - James A. Davis, Diane B. Holdridge:

Factorization Using the Quadratic Sieve Algorithm. CRYPTO 1983: 103-113 - H. Ong, Claus-Peter Schnorr:

Signatures through Approximate Representation by Quadratic Forms. CRYPTO 1983: 117-131 - Oded Goldreich:

A Simple Protocol for Signing Contracts. CRYPTO 1983: 133-136 - Manuel Blum, Umesh V. Vazirani, Vijay V. Vazirani:

Reducibility Among Protocols. CRYPTO 1983: 137-146 - Tom Tedrick:

How to Exchange Half a Bit. CRYPTO 1983: 147-151 - David Chaum:

Blind Signature System. CRYPTO 1983: 153 - M. E. Spencerr, S. E. Travares:

A Layered Broadcast Cryptographic System. CRYPTO 1983: 157-170 - Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters:

Analytical Characteristics of the DES. CRYPTO 1983: 171-202 - Robert S. Winternitz:

Producing a One-Way Hash Function from DES. CRYPTO 1983: 203-207 - Selim G. Akl:

On the Security of Compressed Encodings. CRYPTO 1983: 209-230 - Dorothy E. Denning:

Field Encryption and Authentication. CRYPTO 1983: 231-247 - James A. Reeds, Neil J. A. Sloane:

Shift-Register Synthesis (Modula m). CRYPTO 1983: 249 - Joel E. Sachs, Shimshon Berkovits:

Probabilistic Analysis and Performance Modelling of the 'Swedish' Algorithm and Modifications. CRYPTO 1983: 253-273 - Taher El Gamal:

A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p²). CRYPTO 1983: 275-292 - Rudolf Lidl, Winfried B. Müller:

Permutation Polynomials in RSA-Cryptosystems. CRYPTO 1983: 293-301 - Helmut Jürgensen, D. E. Matthew:

Some Results on the Information Theoretic Analysis of Cryptosystems. CRYPTO 1983: 303-356 - Bahaa W. Fam:

Improving the Security of Exponential Key Exchange. CRYPTO 1983: 359-368 - Umesh V. Vazirani, Vijay V. Vazirani:

RSA Bits are 732+epsilon Secure. CRYPTO 1983: 369-375 - Donald W. Davies:

Use of the 'Signature Token' to Create a Negotiable Document. CRYPTO 1983: 377-382 - Shimon Even, Oded Goldreich:

Electronic Wallet. CRYPTO 1983: 383-386 - David Chaum:

Design Concepts for Tamper Responding Systems. CRYPTO 1983: 387-392

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














