default search action
Search dblp for Publications
export results for "toc:db/conf/crypto/crypto81.bht:"
@proceedings{DBLP:conf/crypto/1981, editor = {Allen Gersho}, title = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1982}, timestamp = {Tue, 13 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/1981.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Adleman81, author = {Leonard M. Adleman}, editor = {Allen Gersho}, title = {Primality Testing}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {10}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Adleman81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AmiraziziH81, author = {Hamid R. Amirazizi and Martin E. Hellman}, editor = {Allen Gersho}, title = {Time-Memory-Processor Tradeoffs}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {7--9}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AmiraziziH81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AmiraziziKR81, author = {Hamid R. Amirazizi and Ehud D. Karnin and Justin M. Reyneri}, editor = {Allen Gersho}, title = {A Polynomial Time Solution for Compact Knapsacks}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {17--19}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AmiraziziKR81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Beker81, author = {H. J. Beker}, editor = {Allen Gersho}, title = {Nonlinear Feedback Shift Register Sequences}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {121--123}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Beker81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Berson81, author = {Thomas A. Berson}, editor = {Allen Gersho}, title = {Local Network Cryptosystem Architecture}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {73--78}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Berson81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Blakley81, author = {G. R. Blakley}, editor = {Allen Gersho}, title = {Key Management from a Security Viewpoint}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {82}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Blakley81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Blum81, author = {Manuel Blum}, editor = {Allen Gersho}, title = {Coin Flipping by Telephone}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {11--15}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Wed, 26 Oct 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Blum81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Brassard81, author = {Gilles Brassard}, editor = {Allen Gersho}, title = {An Optimally Secure Relativized Cryptosystem}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {54--58}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Brassard81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chaum81, author = {David Chaum}, editor = {Allen Gersho}, title = {Verification by Anonymous Monitors}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {138--139}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Chaum81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Davies81, author = {Donald W. Davies}, editor = {Allen Gersho}, title = {Some Regular Properties of the {DES}}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {41}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Davies81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Diffie81, author = {Whitfield Diffie}, editor = {Allen Gersho}, title = {Cryptography, the Next Two Decades}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {84--108}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Diffie81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DiffieKDGS81, author = {Whitfield Diffie and Melville Klein and Michael L. Dertouzos and Andrew Gleason and Dean Smith}, editor = {Allen Gersho}, title = {National Security and Commercial Security: Division of Responsibility}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {154--156}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DiffieKDGS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Even81, author = {Shimon Even}, editor = {Allen Gersho}, title = {Protocol for Signing Contracts}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {148--153}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Even81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Gasser81, author = {Morrie Gasser}, editor = {Allen Gersho}, title = {Limitations on the Use of Encryption to Enforce Mandatory Security}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {130--134}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Gasser81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Gordon81, author = {J. A. Gordon}, editor = {Allen Gersho}, title = {Towards a Design Procedure for Cryptosecure Substitution Boxes}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {53}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Gordon81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HellmanKR81, author = {Martin E. Hellman and Ehud D. Karnin and Justin M. Reyneri}, editor = {Allen Gersho}, title = {On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {2--6}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/HellmanKR81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HenryN81, author = {Paul S. Henry and R. D. Nash}, editor = {Allen Gersho}, title = {High-Speed Hardware Implementation of the Knapsack Cipher}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {16}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/HenryN81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Henze81, author = {Ernst Henze}, editor = {Allen Gersho}, title = {A General Public Key System}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {140--141}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Henze81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Herlestam81, author = {Tore Herlestam}, editor = {Allen Gersho}, title = {Discussion of Adleman's Subexponential Algorithm for Computing Discrete Logarithms}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {142--147}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Herlestam81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ingemarsson81, author = {Ingemar Ingemarsson}, editor = {Allen Gersho}, title = {Some Comments on the Knapsack Problem}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {20--24}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Ingemarsson81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Jordan81, author = {John P. Jordan}, editor = {Allen Gersho}, title = {Variant of a Public Key Cryptosystem Based on Goppa Codes}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {25--30}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Jordan81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kak81, author = {Subhash C. Kak}, editor = {Allen Gersho}, title = {Scrambling and Randomization}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {59--63}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Kak81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kent81, author = {Stephen T. Kent}, editor = {Allen Gersho}, title = {Some Cryptographic Techniques for File Protection}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {80}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Kent81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Konheim81, author = {Alan G. Konheim}, editor = {Allen Gersho}, title = {One-way Sequence for Transaction Verification}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {38}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Konheim81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LangV81, author = {Albert L. Lang and Janet T. Vasek}, editor = {Allen Gersho}, title = {Evaluating Relative Security of Commercial ComSec Devices}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {124--129}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LangV81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LauM81, author = {Y. Alfred Lau and Tom McPherson}, editor = {Allen Gersho}, title = {Implementation of a Hybrid \{RSA/DES\} Key Management System}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {83}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LauM81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LeeC81, author = {Lin{-}Shan Lee and Ger{-}Chih Chou}, editor = {Allen Gersho}, title = {Results on Sampling-based Scrambling for Secure Speech Communication}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {115--119}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 28 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LeeC81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MeijerA81, author = {Henk Meijer and Selim G. Akl}, editor = {Allen Gersho}, title = {Digital Signature Scheme for Computer Communication Networks}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {65--70}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MeijerA81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MilloLM81, author = {Richard A. DeMillo and Nancy A. Lynch and Michael Merritt}, editor = {Allen Gersho}, title = {The Design and Analysis of Cryptographic Protocols}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {71--72}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MilloLM81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Morrison81, author = {Don R. Morrison}, editor = {Allen Gersho}, title = {Subtractive Encryptors - Alternatives to the {DES}}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {42--52}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Morrison81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Nye81, author = {J. Michael Nye}, editor = {Allen Gersho}, title = {Current Market: Products, Costs, Trends}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {110--114}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Nye81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Nye81a, author = {J. Michael Nye}, editor = {Allen Gersho}, title = {The Import/Export Dilemma}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {135--137}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Nye81a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Porter81, author = {Sig Porter}, editor = {Allen Gersho}, title = {A Password Extension for Improved Human Factors}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {81}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Porter81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PurdySS81, author = {George B. Purdy and Gustavus J. Simmons and James Studier}, editor = {Allen Gersho}, title = {Software Protection Using "Communal Key Cryptosystems"}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {79}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Thu, 30 Mar 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PurdySS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SchanningK81, author = {Brian P. Schanning and J. Kowalchuk}, editor = {Allen Gersho}, title = {Memo: {A} Hybrid Approach to Encrypted Electronic Mail}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {64}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/SchanningK81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Shamir81, author = {Adi Shamir}, editor = {Allen Gersho}, title = {The Generation of Cryptographically Strong Pseudo-Random Sequences}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {1}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Shamir81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Simmons81, author = {Gustavus J. Simmons}, editor = {Allen Gersho}, title = {A System for Point-of-Sale or Access User Authentication and Identification}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {31--37}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Simmons81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Smid81, author = {Miles E. Smid}, editor = {Allen Gersho}, title = {{DES} '81: An Update}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {39--40}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Smid81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Weinstein81, author = {Stephen B. Weinstein}, editor = {Allen Gersho}, title = {Security Mechanisms in Electronic Cards}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {109}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Weinstein81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Wyner81, author = {Aaron D. Wyner}, editor = {Allen Gersho}, title = {Some Thoughts on Speech Encryption}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {120}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Wyner81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.