Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)

From MaRDI portal
Publication:1059056

DOI10.1007/3-540-39568-7zbMATH Open0566.00035DBLPconf/crypto/1984OpenAlexW4229511327WikidataQ26883131 ScholiaQ26883131MaRDI QIDQ1059056

No author found.

Publication date: 1985

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: http://link.springer.com/978-3-540-15658-1






Related Items (72)

Equivocations for Homophonic CiphersOn the Use of the Binary Multiplying Channel in a Private Communication SystemLinear Ciphers and Random Sequence Generators with Multiple ClocksRSA-bits are 0.5 + ε secureFast Cryptanalysis of the Matsumoto-Imai Public Key SchemePropagation Characteristics of the DESTime-Division Multiplexing Scramblers: Selecting Permutations and Testing the SystemAlgebraical Structures of Cryptographic TransformationsStrong Primes are Easy to FindOn Cryptosystems Based on Polynomials and Finite FieldsIs the data encryption standard a group? (Results of cycling experiments on DES)Some Public-Key Crypto-Functions as Intractable as FactorizationAn Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial InformationNon Linear Non Commutative Functions for Data IntegrityA New Trapdoor Knapsack Public Key CryptosystemRSA Chips (Past/Present/Future) (Extended abstract)A Prototype Encryption System Using Public KeyA Public Key Cryptosystem and a Signature Scheme Based on Discrete LogarithmsIdentity-Based Cryptosystems and Signature SchemesThe History of Book CiphersAn LSI Digital Encryption Processor (DEP)A Self-Synchronizing Cascaded Cipher System with Dynamic Control of Error PropagationSecurity of Ramp SchemesOn the Cryptographic Applications of Random Functions (Extended Abstract)RSA/Rabin least significant bits are $$ \tfrac{1} {2} + \tfrac{1} {{poly \left( {\log N} \right)}} $$ secure (Extended Abstract)Cryptanalysis of Adfgvx Encipherment SystemsDependence of output on input in DES: Small avalanche characteristicsDes has no Per Round Linear FactorsFair Exchange of Secrets (extended abstract)Cryptoprotocols: Subscription to a Public Key, The Secret Blocking and The Multi-Player Mental Poker Game (extended abstract)A “Paradoxical” Solution to The Signature ProblemSequence Complexity as a Test for Cryptographic SystemsAn Update on Quantum CryptographyHow to Keep a Secret AliveAdvances in cryptology - CRYPTO '89. Proceedings of a conference held at the University of California, Santa Barbara, CA (USA), August 20-24, 1989On Breaking the Iterated Merkle-Hellman Public-Key CryptosystemCryptology and Complexity TheoriesAdvances in CryptologyWire-Tap Channel IIOn the Security of Ping-Pong ProtocolsFast Computation of Discrete Logarithms in GF (q)Security of a Keystream Cipher with Secret Initial ValueA Public-Key Cryptosystem Based on the Matrix Cover NP-Complete ProblemKnapsack Public Key Cryptosystems and Diophantine ApproximationSolving Low Density KnapsacksEvaluation of the Adleman Attack on Multiply Iterated Knapsack CryptosystemsOn the Power of Cascade CiphersThe Prisoners’ Problem and the Subliminal ChannelAn Overview of FactoringNew Ideas for Factoring Large IntegersFactoring Numbers on the Massively Parallel ComputerFactorization Using the Quadratic Sieve AlgorithmSignatures Through Approximate Representations by Quadratic FormsA Simple Protocol for Signing ContractsReducibility Among ProtocolsHow to Exchange Half a BitBlind Signature SystemA Layered Broadcast Cryptographic SystemAnalytical Characteristics of the DESProducing a One-Way Hash Function from DESOn the Security of Compressed EncodingsField Encryption and AuthenticationProbabilistic Analysis and Performance Modelling of the ‘Swedish’ Algorithm and ModificationsA Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p 2)Permutation Polynomials in RSA-CryptosystemsSome Results on the Information Theoretic Analysis of CryptosystemsImproving the Security of Exponential Key ExchangeRSA bits are .732 + ε secureUse of the ‘Signature Token’ to Create a Negotiable DocumentA Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields (preliminary draft)Advances in cryptology -- CRYPTO '85. Proceedings. (A Conference on the Theory and Application of Cryptographic techniques held at the University of California, Santa Barbara, August 18--22, 1985)Authentication Theory/Coding Theory






This page was built for publication: Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)