What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 1981
Year
Venue
Title
1981
CRYPTO
A General Public Key System
Ernst Henze
1981
CRYPTO
A Password Extension for Improved Human Factors
Sig Porter
1981
CRYPTO
A Polynomial Time Solution for Compact Knapsacks
Hamid R. Amirazizi
Ehud D. Karnin
Justin M. Reyneri
1981
CRYPTO
A System for Point-of-Sale or Access User Authentication and Identification
Gustavus J. Simmons
1981
CRYPTO
Advances in Cryptology: A report on CRYPTO 81
Alan Gersho
1981
CRYPTO
An Optimally Secure Relativized Cryptosystem
Gilles Brassard
1981
CRYPTO
Coin Flipping by Telephone
Manuel Blum
1981
CRYPTO
Cryptography, the Next Two Decades
Whitfield Diffie
1981
CRYPTO
Current Market: Products, Costs, Trends
J. Michael Nye
1981
CRYPTO
DES '81: An Update
Miles E. Smid
1981
CRYPTO
Digital Signature Scheme for Computer Communication Networks
Henk Meijer
Selim G. Akl
1981
CRYPTO
Discussion of Adleman's Subexponential Algorithm for Computing Discrete Logarithms
Tore Herlestam
1981
CRYPTO
Evaluating Relative Security of Commercial ComSec Devices
Albert L. Lang
Janet T. Vasek
1981
CRYPTO
High-Speed Hardware Implementation of the Knapsack Cipher
Paul S. Henry
R. D. Nash
1981
CRYPTO
Implementation of a Hybrid {RSA/DES} Key Management System
Y. Alfred Lau
Tom McPherson
1981
CRYPTO
Key Management from a Security Viewpoint
G. R. Blakley
1981
CRYPTO
Limitations on the Use of Encryption to Enforce Mandatory Security
Morrie Gasser
1981
CRYPTO
Local Network Cryptosystem Architecture
Thomas A. Berson
1981
CRYPTO
Memo: A Hybrid Approach to Encrypted Electronic Mail
Brian P. Schanning
J. Kowalchuk
1981
CRYPTO
National Security and Commercial Security: Division of Responsibility
Whitfield Diffie
Melville Klein
Michael L. Dertouzos
Andrew Gleason
Dean Smith
1981
CRYPTO
Nonlinear Feedback Shift Register Sequences
H. J. Beker
1981
CRYPTO
On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis
Martin E. Hellman
Ehud D. Karnin
Justin M. Reyneri
1981
CRYPTO
One-way Sequence for Transaction Verification
Alan G. Konheim
1981
CRYPTO
Primality Testing
Leonard M. Adleman
1981
CRYPTO
Protocol for Signing Contracts
Shimon Even
1981
CRYPTO
Results on Sampling-based Scrambling for Secure Speech Communication
Lin-Shan Lee
Ger-chih Chow
1981
CRYPTO
Scrambling and Randomization
Subhash C. Kak
1981
CRYPTO
Security Mechanisms in Electronic Cards
Stephen B. Weinstein
1981
CRYPTO
Software Protection Using ``Communal Key Cryptosystems''
George B. Purdy
Gustavus J. Simmons
James Studier
1981
CRYPTO
Some Comments on the Knapsack Problem
Ingemar Ingemarsson
1981
CRYPTO
Some Cryptographic Techniques for File Protection
Stephen T. Kent
1981
CRYPTO
Some Regular Properties of the DES
Donald W. Davies
1981
CRYPTO
Some Thoughts on Speech Encryption
A. D. Wyner
1981
CRYPTO
Subtractive Encryptors - Alternatives to the DES
Don R. Morrison
1981
CRYPTO
The Design and Analysis of Cryptographic Protocols
Richard A. DeMillo
Nancy A. Lynch
Michael Merritt
1981
CRYPTO
The Generation of Cryptographically Strong Pseudo-Random Sequences
Adi Shamir
1981
CRYPTO
The Import/Export Dilemma
J. Michael Nye
1981
CRYPTO
Time-Memory-Processor Tradeoffs
Hamid R. Amirazizi
Martin E. Hellman
1981
CRYPTO
Towards a Design Procedure for Cryptosecure Substitution Boxes
J. A. Gordon
1981
CRYPTO
Variant of a Public Key Cryptosystem Based on Goppa Codes
John P. Jordan
1981
CRYPTO
Verification by Anonymous Monitors
David Chaum