The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
1983 (conf/crypto/83)

  1. J. C. Lagarias
    Knapsack Public Key Cryptosystems and Diophantine Approximation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:3-23 [Conf]
  2. Ernest F. Brickell
    Solving Low Density Knapsacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:25-37 [Conf]
  3. Ernest F. Brickell, J. C. Lagarias, Andrew M. Odlyzko
    Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:39-42 [Conf]
  4. Shimon Even, Oded Goldreich
    On the Power of Cascade Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:43-50 [Conf]
  5. Gustavus J. Simmons
    The Prisoners' Problem and the Subliminal Channel. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:51-67 [Conf]
  6. Hugh C. Williams
    An Overview of Factoring. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:71-80 [Conf]
  7. Carl Pomerance, J. W. Smith, Samuel S. Wagstaff
    New Ideas for Factoring Large Integers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:81-85 [Conf]
  8. Marvin C. Wunderlich
    Factoring Numbers on the Massively Parallel Computer. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:87-102 [Conf]
  9. James A. Davis, Diane B. Holdridge
    Factorization Using the Quadratic Sieve Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:103-113 [Conf]
  10. H. Ong, Claus-Peter Schnorr
    Signatures through Approximate Representation by Quadratic Forms. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:117-131 [Conf]
  11. Oded Goldreich
    A Simple Protocol for Signing Contracts. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:133-136 [Conf]
  12. Manuel Blum, Umesh V. Vazirani, Vijay V. Vazirani
    Reducibility Among Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:137-146 [Conf]
  13. Tom Tedrick
    How to Exchange Half a Bit. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:147-151 [Conf]
  14. David Chaum
    Blind Signature System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:153- [Conf]
  15. M. E. Spencerr, S. E. Travares
    A Layered Broadcast Cryptographic System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:157-170 [Conf]
  16. Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters
    Analytical Characteristics of the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:171-202 [Conf]
  17. Robert S. Winternitz
    Producing a One-Way Hash Function from DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:203-207 [Conf]
  18. Selim G. Akl
    On the Security of Compressed Encodings. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:209-230 [Conf]
  19. Dorothy E. Denning
    Field Encryption and Authentication. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1983, pp:231-247 [Conf]
  20. James A. Reeds, N. J. A. Sloane
    Shift-Register Synthesis (Modula m). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:249- [Conf]
  21. Joel E. Sachs, Shimshon Berkovits
    Probabilistic Analysis and Performance Modelling of the `Swedish' Algorithm and Modifications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:253-273 [Conf]
  22. Taher El Gamal
    A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p²). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:275-292 [Conf]
  23. Rudolf Lidl, Winfried B. Müller
    Permutation Polynomials in RSA-Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:293-301 [Conf]
  24. Helmut Jürgensen, D. E. Matthew
    Some Results on the Information Theoretic Analysis of Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:303-356 [Conf]
  25. Bahaa W. Fam
    Improving the Security of Exponential Key Exchange. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:359-368 [Conf]
  26. Umesh V. Vazirani, Vijay V. Vazirani
    RSA Bits are 732+epsilon Secure. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:369-375 [Conf]
  27. Donald W. Davies
    Use of the `Signature Token' to Create a Negotiable Document. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:377-382 [Conf]
  28. Shimon Even, Oded Goldreich
    Electronic Wallet. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:383-386 [Conf]
  29. David Chaum
    Design Concepts for Tamper Responding Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:387-392 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002