-
2
-
-
0001671902
-
On distinguishing prime numbers from composite numbers”
-
L M. Adleman, C. Pomerance, and R. S. Rumley, “On distinguishing prime numbers from composite numbers”, Ann. Math., vol. 117, no. 2, pp. 173–206, 1983.
-
(1983)
Ann. Math.
, vol.117
, Issue.2
, pp. 173-206
-
-
Adleman, L.M.1
Pomerance, C.2
Rumley, R.S.3
-
4
-
-
0021557360
-
RSA/ Rabin bits are 1/2 + 1 /‘poly ‘log N’’ secure”
-
W. Alexi, B. Chor, O. Goldreich, and C. P. Schnor, “RSA/ Rabin bits are 1/2 + 1 /‘poly ‘log N’’ secure”, in 25th Annual IEEESymp. on Foundations of Comp. Sci., pp. 449-457, 1984.
-
(1984)
25th Annual IEEESymp. on Foundations of Comp. Sci.
, pp. 449-457
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnor, C.P.4
-
5
-
-
0020721991
-
A modular approach to key safeguarding”
-
Mar.
-
C. Asmuth and J. Blum, “A modular approach to key safeguarding”, IEEE Trans. Informat. Theory, vol. IT-29, pp. 208–210, Mar. 1983.
-
(1983)
IEEE Trans. Informat. Theory
, vol.IT-29
, pp. 208-210
-
-
Asmuth, C.1
Blum, J.2
-
6
-
-
84939318909
-
Contractors ready low-cost, secure telephone for 1987 service start”
-
Jan.
-
“Contractors ready low-cost, secure telephone for 1987 service start”, Aviat. Week Space Technol., pp. 114-115, Jan. 1986.
-
(1986)
Aviat. Week Space Technol.
, pp. 114-115
-
-
-
7
-
-
84939394578
-
Cypher chip makes key distribution a snap”
-
Aug. 7
-
C. Barney, “Cypher chip makes key distribution a snap”, Electronics, Aug. 7, 1986.
-
(1986)
Electronics
-
-
Barney, C.1
-
8
-
-
84917270032
-
-
Boston, MA: Houghton Mifflin
-
J. Barron, Breaking the Ring. Boston, MA: Houghton Mifflin, 1987.
-
(1987)
Breaking the Ring
-
-
Barron, J.1
-
9
-
-
84939380202
-
Mailsafe signs, seals, and delivers files”
-
Sept. 15
-
D. ben-Aaron, “Mailsafe signs, seals, and delivers files”, Information Week, pp. 19-22, Sept. 15, 1986.
-
(1986)
Information Week
, pp. 19-22
-
-
ben-Aaron, D.1
-
10
-
-
0007550789
-
Computing logarithms in finite fields of characteristic two”
-
June
-
I. F. Blake, R. Fuji-Hara, R. C. Mullin, and S. A. Vanstone, “Computing logarithms in finite fields of characteristic two”, SIAM J. Alg. Disc. Methods, vol. 5, no. 2, pp. 276–285, June 1984.
-
(1984)
SIAM J. Alg. Disc. Methods
, vol.5
, Issue.2
, pp. 276-285
-
-
Blake, I.F.1
Fuji-Hara, R.2
Mullin, R.C.3
Vanstone, S.A.4
-
11
-
-
85062838317
-
Safeguarding cryptographic keys”
-
C. R. Blakley, “Safeguarding cryptographic keys”, in National Computer Conf., pp. 313-317, 1979.
-
(1979)
National Computer Conf.
, pp. 313-317
-
-
Blakley, C.R.1
-
12
-
-
84939363125
-
-
Advances in Cryptology: Proceedings of Crypto ‘84. Berlin, Germany: Springer-Ver-lag
-
G. R. Blakley and D. Chaum, Eds., Advances in Cryptology: Proceedings of Crypto ‘84. Berlin, Germany: Springer-Ver-lag, 1985.
-
(1985)
Eds
-
-
Blakley, G.R.1
Chaum, D.2
-
13
-
-
0022880639
-
Non-transitive transferof confidence: A perfect zero-knowledge interactive protocol for SAT and beyond”
-
C. Crépeau, in
-
G. Brassard and C. Crépeau, “Non-transitive transferof confidence: A perfect zero-knowledge interactive protocol for SAT and beyond”, in 27fh Annual IEEE Symp. on the Foundations of Comp. Sci., pp. 188-195, 1986.
-
(1986)
27fh Annual IEEE Symp. on the Foundations of Comp. Sci.
, pp. 188-195
-
-
Brassard, G.1
-
14
-
-
84939366902
-
Minimum disclosure proofs of disclosure proofs of knowledge”
-
Amsterdam, Rep. PM-R8710, Dec. 1987. ‘To appear as an invited paper in }. Comput. Syst. Sci.’
-
G. Brassard, C. Crépeau, and D. Chaum, “Minimum disclosure proofs of disclosure proofs of knowledge”, Center for Mathematics and Computer Science, Amsterdam, Rep. PM-R8710, Dec. 1987. ‘To appear as an invited paper in }. Comput. Syst. Sci.’
-
Center for Mathematics and Computer Science
-
-
Brassard, G.1
Crépeau, C.2
Chaum, D.3
-
15
-
-
0020900943
-
A fast modular multiplication algorithm with application to two key cryptography”
-
E. F. Brickell, “A fast modular multiplication algorithm with application to two key cryptography”, in Crypto ‘82 [20], pp. 51-60.
-
Crypto ‘82 [20]
, pp. 51-60
-
-
Brickell, E.F.1
-
16
-
-
84939391205
-
A status report on knapsack based public key cryptosystems”
-
The CCIS encryptor is mentioned on pp. 4–5.
-
E. F. Brickell and G. J. Simmons, “A status report on knapsack based public key cryptosystems”, Congressus Numerantium, vol. 7, pp. 3–72, 1983. The CCIS encryptor is mentioned on pp. 4–5.
-
(1983)
Congressus Numerantium
, vol.7
, pp. 3-72
-
-
Brickell, E.F.1
Simmons, G.J.2
-
17
-
-
85034633063
-
Breaking iterated knapsacks”
-
E. F. Brickell, “Breaking iterated knapsacks”, in Crypto ‘84 [12], pp. 342-358.
-
Crypto ‘84 [12]
, pp. 342-358
-
-
Brickell, E.F.1
-
18
-
-
84939360269
-
NSA seeking 500,000 ‘secure’ telephones”
-
October 7,1984.
-
D. Burnham, “NSA seeking 500,000 ‘secure’ telephones”, The New York Times, October 7,1984.
-
The New York Times
-
-
Burnham, D.1
-
19
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms”
-
Feb.
-
D.L Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms”, CACM, vol. 24, no. 2, pp. 84–88, Feb. 1981.
-
(1981)
CACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
20
-
-
0001604533
-
-
Proceedings of Crypto ‘82. New York, NY: Plenum
-
D. Chaum, R. L. Rivest, and A. T. Sherman, Eds., Advances in Cryptology, Proceedings of Crypto ‘82. New York, NY: Plenum, 1983.
-
(1983)
Advances in Cryptology
-
-
Chaum, D.1
Rivest, R.L.2
Sherman, A.T.3
-
21
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete”
-
Oct.
-
D. Chaum, “Security without identification: Transaction systems to make big brother obsolete”, CACM, vol. 28, no. 10, pp. 1030–1044, Oct. 1985.
-
(1985)
CACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
22
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations”
-
D. Chaum and J.-H. Evertse, “A secure and privacy-protecting protocol for transmitting personal information between organizations”, in Crypto ‘86 [80], pp. 118-167.
-
Crypto ‘86 [80]
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.-H.2
-
23
-
-
84976713185
-
Demonstrating that a public predicate can be satisfied without revealing any information about how”
-
D. Chaum, “Demonstrating that a public predicate can be satisfied without revealing any information about how”, in Crypto ‘86 [80], pp. 195-199.
-
Crypto ‘86 [80]
, pp. 195-199
-
-
Chaum, D.1
-
24
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender untraceability”
-
D. Chaum, “The dining cryptographers problem: Unconditional sender untraceability”, J. Cryptology, vol. 1, no. 1, pp. 65–75, 1988.
-
(1988)
J. Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
25
-
-
85010651974
-
A knapsack type public-key cryptosystem based on arithmetic in finite fields”
-
B. Chor and R. L. Rivest, “A knapsack type public-key cryptosystem based on arithmetic in finite fields”, in Crypto ‘84 [12], pp. 54-65.
-
Crypto ‘84 [12]
, pp. 54-65
-
-
Chor, B.1
Rivest, R.L.2
-
26
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults”
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, “Verifiable secret sharing and achieving simultaneity in the presence of faults”, in 26th Annual IEEE Symp. on the Foundations of Comp. Sci., pp. 383-395, 1985.
-
(1985)
26th Annual IEEE Symp. on the Foundations of Comp. Sci.
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
27
-
-
84939345509
-
U.S. District Court
-
the , Northern District of California, Mar. 25, 1986. Reported by Vivian Pella Balboni
-
Testimony of David Earl Clark at the trial of Jerry Alfred Whitworth before Judge J. P. Vukasin, jr., in the U.S. District Court, Northern District of California, Mar. 25, 1986. Reported by Vivian Pella Balboni, pp. 11-1345.
-
Testimony of David Earl Clark at the trial of Jerry Alfred Whitworth before Judge J. P. Vukasin, jr.
, pp. 11-1345
-
-
-
28
-
-
0021468777
-
Fast evaluation of logarithms in fields of characteristic two”
-
D. Coppersmith, “Fast evaluation of logarithms in fields of characteristic two”, IEEE Trans. Informat. Theory, vol. IT-30, pp. 587–594, 1984.
-
(1984)
IEEE Trans. Informat. Theory
, vol.IT-30
, pp. 587-594
-
-
Coppersmith, D.1
-
29
-
-
0022953575
-
Discrete logarithms in GF‘p’”
-
D. Coppersmith, A. M. Odlyzko, and R. Schroeppel, “Discrete logarithms in GF‘p’”, Algorithmica, vol. 1, pp. 1–16, 1986.
-
(1986)
Algorithmica
, vol.1
, pp. 1-16
-
-
Coppersmith, D.1
Odlyzko, A.M.2
Schroeppel, R.3
-
30
-
-
84939369946
-
-
Proceedings of EUROCRYPT ‘84. Berlin, Germany: Springer-Verlag
-
N. Cot and I. Ingemarsson, Eds., Advances in Cryptology, Proceedings of EUROCRYPT ‘84. Berlin, Germany: Springer-Verlag, 1985.
-
(1985)
Advances in Cryptology
-
-
Cot, N.1
Ingemarsson, I.2
-
31
-
-
84939374244
-
Cidec-HS high speed DES encryption for digital networks”
-
product description, Cylink Corporation, Sunnyvale, CA.
-
“Cidec-HS high speed DES encryption for digital networks”, product description, Cylink Corporation, Sunnyvale, CA.
-
-
-
-
32
-
-
84939343219
-
Key management development package”
-
product description, Cylink Corporation, Sunnyvale, CA.
-
“Key management development package”, product description, Cylink Corporation, Sunnyvale, CA.
-
-
-
-
33
-
-
84861980629
-
The applications of digital signatures based on public key cryptosystems”
-
National Physical Laboratory Rep. DNACS 39/80, Dec.
-
D. W. Davies and W. L. Price, “The applications of digital signatures based on public key cryptosystems”, National Physical Laboratory Rep. DNACS 39/80, Dec. 1980.
-
(1980)
-
-
Davies, D.W.1
Price, W.L.2
-
34
-
-
84939376132
-
Status report on factoring ‘at the Sandia National Laboratories’”
-
J. A. Davis, D. B. Holdridge, and G.J. Simmons, “Status report on factoring ‘at the Sandia National Laboratories’”, in Eurocrypt ‘84 [30], pp. 183-215.
-
Eurocrypt ‘84 [30]
, pp. 183-215
-
-
Davis, J.A.1
Holdridge, D.B.2
Simmons, G.J.3
-
35
-
-
85059221313
-
Multiuser cryptographic techniques”
-
‘New York, June 7-10
-
W. Diffie and M. E. Hellman, “Multiuser cryptographic techniques”, in Proc. Nat. Computer Conf., ‘New York, NY’, pp. 109-112, June 7-10, 1976.
-
(1976)
Proc. Nat. Computer Conf.
, vol.NY’
, pp. 109-112
-
-
Diffie, W.1
Hellman, M.E.2
-
36
-
-
0017018484
-
New directions in cryptography”
-
Nov.
-
W. Diffie and M. E. Hellman, “New directions in cryptography”, IEEE Trans. Informat. Theory, vol. IT-22, pp. 644–654, Nov. 1976.
-
(1976)
IEEE Trans. Informat. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
37
-
-
0017501281
-
Exhaustive cryptanalysis of the NBS data encryption standard”
-
June
-
W. Diffie and M. E. Hellman, “Exhaustive cryptanalysis of the NBS data encryption standard”, Computer, vol. 10, no. 6, pp. 74–84, June 1977.
-
(1977)
Computer
, vol.10
, Issue.6
, pp. 74-84
-
-
Diffie, W.1
Hellman, M.E.2
-
38
-
-
84939321290
-
Conventional versus public key cryptosystems”
-
Rabin's system is discussed on 70, the relative strength of conventional and public-key distribution on pp. 64-66.
-
W. Diffie, “Conventional versus public key cryptosystems”, in [109], pp. 41-72. Rabin's system is discussed on p. 70, the relative strength of conventional and public-key distribution on pp. 64-66.
-
[109]
, pp. 41-72
-
-
Diffie, W.1
-
39
-
-
84939333844
-
Cryptographic technology: Fifteen-year forecast”
-
W. Diffie, “Cryptographic technology: Fifteen-year forecast”, in [109], pp. 301-327.
-
[109]
, pp. 301-327
-
-
Diffie, W.1
-
40
-
-
84939353369
-
Securing the DoD transmission control protocol”
-
W. Diffie, “Securing the DoD transmission control protocol”, in Crypto ‘85 [114], pp. 108-127.
-
Crypto ‘85 [114]
, pp. 108-127
-
-
Diffie, W.1
-
41
-
-
84939324841
-
An ISDN secure telephone unit”
-
W. Diffie, L. Strawczynski, B. O'Higgins, and D. Steer, “An ISDN secure telephone unit”, in Proc. National Communications Forum 1987, pp. 473-477.
-
Proc. National Communications Forum 1987
, pp. 473-477
-
-
Diffie, W.1
Strawczynski, L.2
O'Higgins, B.3
Steer, D.4
-
42
-
-
84939352332
-
N.M. scientist cracks code, wins $1000
-
Nov. 6
-
E. Dolnick, “N.M. scientist cracks code, wins $1000”, The Boston Globe, Nov. 6, 1984.
-
(1984)
The Boston Globe
-
-
Dolnick, E.1
-
43
-
-
84939348988
-
Comsec and Compusec market study”
-
Jan. 14
-
Electronic Industries Association, “Comsec and Compusec market study”, Jan. 14, 1987.
-
(1987)
-
-
Electronic Industries Association1
-
44
-
-
84931459468
-
Encryption algorithm for computer data protection”
-
no. , Mar. 17,1975.
-
Federal Register, “Encryption algorithm for computer data protection”, vol. 40, no. 52, pp. 12134–12139, Mar. 17,1975.
-
, vol.40
, Issue.52
, pp. 12134-12139
-
-
Register, F.1
-
46
-
-
84939364980
-
Analysis of a public key approach based on polynomial substitution”
-
H. Fell and W. Diffie, “Analysis of a public key approach based on polynomial substitution”, in Crypto ‘85 [114], pp. 108-127.
-
Crypto ‘85 [114]
, pp. 108-127
-
-
Fell, H.1
Diffie, W.2
-
47
-
-
84990731886
-
How to prove your self: Practical solutions to identification and signature problems”
-
A. Fiat and A. Shamir, “How to prove your self: Practical solutions to identification and signature problems”, in Crypto ‘86 [80], pp. 186-212.
-
Crypto ‘86 [80]
, pp. 186-212
-
-
Fiat, A.1
Shamir, A.2
-
48
-
-
0003146062
-
A new kind of cipher that would take millions of years to break”
-
‘Mathematical Games’, Aug.
-
M. Gardner, “A new kind of cipher that would take millions of years to break”, Sci. Amer., pp. 120-124 ‘Mathematical Games’, Aug. 1977.
-
(1977)
Sci. Amer.
, pp. 120-124
-
-
Gardner, M.1
-
49
-
-
0022914590
-
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design”
-
O. Goldreich, S. Micali, and A. Wigderson, “Proofs that yield nothing but their validity and a methodology of cryptographic protocol design”, in 27th Annual IEEE Conf. on the Foundations of Comp. Sci., pp. 174-187, 1986.
-
(1986)
27th Annual IEEE Conf. on the Foundations of Comp. Sci.
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
50
-
-
0021941417
-
Knowledge complexity of interactive proofs”
-
S. Goldwasser, S. Micali, and C. Rackoff, “Knowledge complexity of interactive proofs”, in 17th Symp. on the Theory of Computing, pp. 291-304, 1985.
-
(1985)
17th Symp. on the Theory of Computing
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
52
-
-
84969342159
-
Strong primes are easy to find”
-
J. Gordon, “Strong primes are easy to find”, in Eurocrypt ‘84 [30], pp. 215-223.
-
Eurocrypt ‘84 [30]
, pp. 215-223
-
-
Gordon, J.1
-
53
-
-
84939352973
-
-
this lecture, which has unfortunately never been published, Gordon assembled the facts of Alice and Bob's precarious lives, which had previously been available only as scattered references in the literature.
-
J. Gordon, speech at the Zurich Seminar, 1984. In this lecture, which has unfortunately never been published, Gordon assembled the facts of Alice and Bob's precarious lives, which had previously been available only as scattered references in the literature.
-
(1984)
speech at the Zurich Seminar
-
-
Gordon, J.1
-
54
-
-
0041198138
-
Cellular automaton public key cryptosystem”
-
P. Guam, “Cellular automaton public key cryptosystem”, Complex Systems, vol. 1, pp. 51–56, 1987.
-
(1987)
Complex Systems
, vol.1
, pp. 51-56
-
-
Guam, P.1
-
55
-
-
0021975313
-
The cryptographic security of truncated linearly related variables”
-
J. Hastad and A. Shamir, “The cryptographic security of truncated linearly related variables”, in 17th Symp. on Theory of Computing, pp. 356-362, 1985.
-
(1985)
17th Symp. on Theory of Computing
, pp. 356-362
-
-
Hastad, J.1
Shamir, A.2
-
56
-
-
84939332849
-
Coding chip devised in Waterloo”
-
Jan. 1
-
D. Helwig, “Coding chip devised in Waterloo”, The Globe and Mail, Jan. 1, 1987.
-
(1987)
The Globe and Mail
-
-
Helwig, D.1
-
57
-
-
84939327022
-
National EFT POS to use public key cryptography”
-
Nov.
-
“National EFT POS to use public key cryptography”, Information Security Monitor, vol. 2, no. 12, p. 1, Nov. 1987.
-
(1987)
Information Security Monitor
, vol.2
, Issue.12
, pp. 1
-
-
-
58
-
-
85046278091
-
Secret sharing scheme realizing general access structure”
-
M. Ito, A. Saito, and T. Nishizeki, “Secret sharing scheme realizing general access structure”, in Globecom ‘87, pp. 361-364, 1987.
-
(1987)
Globecom ‘87
, pp. 361-364
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
60
-
-
0003245845
-
Seminumerical algorithms”
-
2nd ed. Reading, MA: Addison-Wesley
-
D. Knuth, “Seminumerical algorithms”, in The Art of Computer Programming, vol. 2, 2nd ed. Reading, MA: Addison-Wesley, 1981, pp. 316–336.
-
(1981)
The Art of Computer Programming
, vol.2
, pp. 316-336
-
-
Knuth, D.1
-
63
-
-
84939325868
-
T1 encryption plan protects data”
-
March 3
-
R. Kopeck, “T1 encryption plan protects data”, PC Week, March 3, 1987.
-
(1987)
PC Week
-
-
Kopeck, R.1
-
64
-
-
0019341155
-
Communication privacy: Integration of public and secret key cryptography”
-
‘Houston, TX’, Nov. 30-Dec. 4
-
J. Kowalchuk, B. P. Schanning, and S. Powers, “Communication privacy: Integration of public and secret key cryptography”, in National Telecommunications Conf., ‘Houston, TX’, pp. 49.1.1-5, Nov. 30-Dec. 4, 1980.
-
(1980)
National Telecommunications Conf.
, pp. 49.1.1-5
-
-
Kowalchuk, J.1
Schanning, B.P.2
Powers, S.3
-
67
-
-
0040030793
-
A simple and effective public key cryptosystem”
-
Spring
-
S. Lu and L. Lee, “A simple and effective public key cryptosystem”, Comsat Technical Rev., vol. 9, no. 1, Spring 1979.
-
(1979)
Comsat Technical Rev.
, vol.9
, Issue.1
-
-
Lu, S.1
Lee, L.2
-
68
-
-
84939393244
-
A key distribution system equivalent to factoring”
-
University of Southern California, June 3,1987.
-
K. S. McCurley, “A key distribution system equivalent to factoring”, Department of Mathematics, University of Southern California, June 3,1987.
-
Department of Mathematics
-
-
McCurley, K.S.1
-
69
-
-
0003777826
-
A public key cryptosystem based on algebraic coding theory”
-
JPL DSN Progress Rep. 42-44, Jan.-Feb.
-
R. J. McEliece, “A public key cryptosystem based on algebraic coding theory”, JPL DSN Progress Rep. 42-44, pp. 114-116, Jan.-Feb. 1978.
-
(1978)
, pp. 114-116
-
-
McEliece, R.J.1
-
70
-
-
0017959977
-
Secure communication over insecure channels”
-
Apr.
-
R. Merkle, “Secure communication over insecure channels”, CACM, pp. 294-299, Apr. 1978.
-
(1978)
CACM
, pp. 294-299
-
-
Merkle, R.1
-
71
-
-
0018019325
-
Hiding information and signatures in trap door knapsacks”
-
Sept.
-
R. C. Merkle and M. E. Hellman, “Hiding information and signatures in trap door knapsacks”, IEEE Trans. Informat. Theory, vol. IT-24, pp. 525–30, Sept. 1978.
-
(1978)
IEEE Trans. Informat. Theory
, vol.IT-24
, pp. 525-530
-
-
Merkle, R.C.1
Hellman, M.E.2
-
72
-
-
84939395457
-
Time Magazine
-
no. , Nov. 15
-
R. Merkle, Letters to the Editor, Time Magazine, vol. 120, no. 20, p. 8, Nov. 15, 1982.
-
(1982)
Letters to the Editor
, vol.120
, Issue.20
, pp. 8
-
-
Merkle, R.1
-
73
-
-
84966219731
-
A method of factoring and the factorization of F7”
-
M. A. Morrison and J. Brillhart, “A method of factoring and the factorization of F7”, Math. Comp., vol. 29, pp. 18–205, 1975.
-
(1975)
Math. Comp.
, vol.29
, pp. 18-205
-
-
Morrison, M.A.1
Brillhart, J.2
-
75
-
-
84909540601
-
A data link encryption system”
-
‘Washington, DC’, Nov. 27-29
-
F. H. Myers, “A data link encryption system”, in National Telecommunications Conf., ‘Washington, DC’, pp. 4.5.1-4.5.8, Nov. 27-29, 1979.
-
(1979)
National Telecommunications Conf.
, pp. 4.5.1-4.5.8
-
-
Myers, F.H.1
-
76
-
-
0018048246
-
Using encryption for authentication in large networks of computers”
-
Dec.
-
R. M. Needham and M. D. Schroeder, “Using encryption for authentication in large networks of computers”, CACM, vol. 21, pp. 993–999, Dec. 1978.
-
(1978)
CACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
77
-
-
84939392172
-
A comparison of four key distribution methods”
-
July
-
L. Neuwirth, “A comparison of four key distribution methods”, Telecommunications, pp. 110–111,114-115, July 1986.
-
(1986)
Telecommunications
, pp. 110-111
-
-
Neuwirth, L.1
-
78
-
-
84939321858
-
Statement of Lee Neuwirth of Cylink on HR145”
-
submitted to Congressional committees considering HR145, Feb.
-
“Statement of Lee Neuwirth of Cylink on HR145”, submitted to Congressional committees considering HR145, Feb. 1987.
-
(1987)
-
-
-
79
-
-
0000746996
-
Discrete logarithms in finite fields and their cryptographic significance”
-
A. M. Odlyzko, “Discrete logarithms in finite fields and their cryptographic significance”, in Eurocrypt ‘84 [30], pp. 225-314.
-
Eurocrypt ‘84 [30]
, pp. 225-314
-
-
Odlyzko, A.M.1
-
81
-
-
84939325553
-
Encryption and ISDN-A natural fit”
-
‘Phoenix, AZ’, Mar. 16-20
-
B. O'Higgins, W. Diffie, L. Strawczynski, and R. de Hoog, “Encryption and ISDN-A natural fit”, in International Switching Symp., ‘Phoenix, AZ’, pp. A11.4.1-7, Mar. 16-20, 1987.
-
(1987)
International Switching Symp.
, pp. A11.4.1-7
-
-
O'Higgins, B.1
Diffie, W.2
Strawczynski, L.3
de Hoog, R.4
-
83
-
-
84919085619
-
An improved algorithm for computing logarithms in GF‘p’ and its cryptographic significance”
-
Jan.
-
S. C. Pohlig and M. E. Hellman, “An improved algorithm for computing logarithms in GF‘p’ and its cryptographic significance”, IEEE Trans. Informat. Theory, vol. IT-24, pp. 106–110, Jan. 1978.
-
(1978)
IEEE Trans. Informat. Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
84
-
-
0040019849
-
Recent developments in primality testing”
-
C. Pomerance, “Recent developments in primality testing”, The Mathematical Intelligence, vol. 3, no. 3, pp. 97–105, 1981.
-
(1981)
The Mathematical Intelligence
, vol.3
, Issue.3
, pp. 97-105
-
-
Pomerance, C.1
-
85
-
-
84939372938
-
A pipeline architecture for factoring large integers with the quadratic sieve algorithm”
-
to appear in a special issue on cryptography of the SIAM J. Computing.
-
C. Pomerance, J. W. Smith, and R. Tuler, “A pipeline architecture for factoring large integers with the quadratic sieve algorithm”, to appear in a special issue on cryptography of the SIAM J. Computing.
-
-
-
Pomerance, C.1
Smith, J.W.2
Tuler, R.3
-
86
-
-
77956133766
-
Digitalized signatures and public-key functions as intractable as factorization”
-
MIT/LCS/TR-212, Jan.
-
M. O. Rabin, “Digitalized signatures and public-key functions as intractable as factorization”, MIT Laboratory for Computer Science, MIT/LCS/TR-212, Jan. 1979.
-
(1979)
MIT Laboratory for Computer Science
-
-
Rabin, M.O.1
-
87
-
-
84939344025
-
Datacryptor II, public key management option”
-
Sunrise Florida
-
“Datacryptor II, public key management option”, Racal- Milgo, Sunrise Florida, 1981.
-
(1981)
Racal- Milgo
-
-
-
88
-
-
84939382229
-
AT&T readying new spy-proof phone for big military and civilian markets”
-
June 2
-
“AT&T readying new spy-proof phone for big military and civilian markets”, The Report on AT&T, pp. 6-7, June 2, 1986.
-
(1986)
The Report on AT&T
, pp. 6-7
-
-
-
89
-
-
84939396004
-
A two-chip implementation of the RSA public-key encryption algorithm”
-
‘Orlando, Nov.
-
R. F. Rieden, J. B. Snyder, R. J. Widman, and W. J. Barnard, “A two-chip implementation of the RSA public-key encryption algorithm”, in COMAC ‘Government Microcircuit Applications Conference’, ‘Orlando, FL’, pp. 24-27, Nov. 1982.
-
(1982)
COMAC ‘Government Microcircuit Applications Conference’
, vol.FL’
, pp. 24-27
-
-
Rieden, R.F.1
Snyder, J.B.2
Widman, R.J.3
Barnard, W.J.4
-
90
-
-
0043126255
-
On digital signatures and public key cryptosystems”
-
MIT/LCS/TR-212, Jan.
-
R. L. Rivest, A. Shamir, and L. Adleman, “On digital signatures and public key cryptosystems”, MIT Laboratory for Computer Science, MIT/LCS/TR-212, Jan. 1979.
-
(1979)
MIT Laboratory for Computer Science
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
91
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems”
-
Feb.
-
R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems”, CACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.
-
(1978)
CACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
92
-
-
84939378853
-
-
personal communication with H.C.Williams cited on in [113].
-
R. Rivest, personal communication with H.C.Williams cited on p. 729 in [113].
-
-
-
Rivest, R.1
-
93
-
-
84887212810
-
A description of a single-chip implementation of the RSA cipher”
-
Fall
-
R. Rivest, “A description of a single-chip implementation of the RSA cipher”, Lambda, vol. 1, no. 3, pp. 14–18, Fall 1980.
-
(1980)
Lambda
, vol.1
, Issue.3
, pp. 14-18
-
-
Rivest, R.1
-
94
-
-
85028745190
-
RSA chips ‘past/present/future’”
-
R. Rivest, “RSA chips ‘past/present/future’”, in Eurocrypt ‘84 [30], pp. 159-165.
-
Eurocrypt ‘84 [30]
, pp. 159-165
-
-
Rivest, R.1
-
95
-
-
84939327070
-
An overview of the caneware program”
-
paper 31, presented at the 3rd Annual Symp. on Physical/Electronic Security, Armed Forces Communications and Electronics Association, Philadelphia Chapter, Aug.
-
H. L. Rogers, “An overview of the caneware program”, paper 31, presented at the 3rd Annual Symp. on Physical/Electronic Security, Armed Forces Communications and Electronics Association, Philadelphia Chapter, Aug. 1987.
-
(1987)
-
-
Rogers, H.L.1
-
96
-
-
84939384273
-
Toward a new factoring record”
-
Jan. 23
-
“Toward a new factoring record”, Science News, p. 62, Jan. 23, 1987.
-
(1987)
Science News
, pp. 62
-
-
-
97
-
-
84939371673
-
SDNS: A network on implementation”
-
‘Baltimore, Sept. 21-24, Session containing six papers on the Secure Data Network System.
-
“SDNS: A network on implementation”, in 10th National Computer Security Conf., ‘Baltimore, MD’, pp. 150-174, Sept. 21-24, 1987. Session containing six papers on the Secure Data Network System.
-
(1987)
10th National Computer Security Conf.
, vol.MD’
, pp. 150-174
-
-
-
98
-
-
0002157534
-
A fast signature scheme”
-
Technical Memorandum, MIT/LCS/TM-107, July
-
A. Shamir, “A fast signature scheme”, M.I.T. Laboratory for Computer Science, Technical Memorandum, MIT/LCS/TM-107, July 1978.
-
(1978)
M.I.T. Laboratory for Computer Science
-
-
Shamir, A.1
-
99
-
-
4544336448
-
Mental poker”
-
Technical Memorandum, MIT/LCS/TM-125, Jan. 29
-
A. Shamir, R. L. Rivest, and L. M. Adleman, “Mental poker”, MIT Laboratory for Computer Science, Technical Memorandum, MIT/LCS/TM-125, Jan. 29, 1979.
-
(1979)
MIT Laboratory for Computer Science
-
-
Shamir, A.1
Rivest, R.L.2
Adleman, L.M.3
-
100
-
-
0018545449
-
How to share a secret”
-
Nov.
-
A. Shamir, “How to share a secret”, CACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.
-
(1979)
CACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
101
-
-
84939356774
-
A polynomial time algorithm for breaking Merkle-Hellman cryptosystems ‘extended abstract’”, Research announcement, preliminary draft, Applied Mathematics, Weizmann Institute, Rehovot, Israel, April 20, 1982. This paper appeared with a slightly different title: “A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem ‘extended abstract’”
-
A. Shamir, “A polynomial time algorithm for breaking Merkle-Hellman cryptosystems ‘extended abstract’,” Research announcement, preliminary draft, Applied Mathematics, Weizmann Institute, Rehovot, Israel, April 20, 1982. This paper appeared with a slightly different title: “A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem ‘extended abstract’”, in Crypto ‘82 [20], pp. 279-288.
-
Crypto ‘82 [20]
, pp. 279-288
-
-
Shamir, A.1
-
102
-
-
0021484340
-
A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem”
-
Sept.
-
A. Shamir, “A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem”, IEEE Trans. Informat. Theory, vol. IT-30, no. 5, pp. 699–704, Sept. 1984.
-
(1984)
IEEE Trans. Informat. Theory
, vol.IT-30
, Issue.5
, pp. 699-704
-
-
Shamir, A.1
-
103
-
-
0009435059
-
Composite Diffie-Hellman public-key generating systems are hard to break”
-
Technion, Haifa, Israel,Technical Rep. 356, Feb.
-
Z. Shmuely, “Composite Diffie-Hellman public-key generating systems are hard to break”, Computer Science Department, Technion, Haifa, Israel,Technical Rep. 356, Feb. 1985.
-
(1985)
Computer Science Department
-
-
Shmuely, Z.1
-
104
-
-
84939367466
-
The computation of indices modulo P”
-
Working Paper WP-07062, May 7
-
R. Silver, “The computation of indices modulo P”, Mitre Corporation, Working Paper WP-07062, p. 3, May 7, 1964.
-
(1964)
Mitre Corporation
, pp. 3
-
-
Silver, R.1
-
105
-
-
84950896696
-
Preliminary comments on the M.I.T. public key cryptosystem”
-
Oct.
-
G. J. Simmons and M. J. Norris, “Preliminary comments on the M.I.T. public key cryptosystem”, Cryptologia, vol. 1, pp. 406–414, Oct. 1977.
-
(1977)
Cryptologia
, vol.1
, pp. 406-414
-
-
Simmons, G.J.1
Norris, M.J.2
-
106
-
-
84947571309
-
Authentication without secrecy: A secure communications problem uniquely solvable by asymmetric encryption techniques”
-
DC’, Oct. 9-11
-
G. J. Simmons, “Authentication without secrecy: A secure communications problem uniquely solvable by asymmetric encryption techniques”, in IEEE EASCON ‘79 ‘Washington, DC’, pp. 661-662, Oct. 9-11, 1979.
-
(1979)
IEEE EASCON ‘79 ‘Washington
, pp. 661-662
-
-
Simmons, G.J.1
-
107
-
-
84939333794
-
How to cipher faster using redundant number systems”
-
SAND-80-1886, Aug.
-
G.J. Simmons and M.J. Norris, “How to cipher faster using redundant number systems”, Sandia National Laboratories, SAND-80-1886, Aug. 1980.
-
(1980)
Sandia National Laboratories
-
-
Simmons, G.J.1
Norris, M.J.2
-
108
-
-
84939394912
-
High speed arithmetic utilizing redundant number systems”
-
‘Houston, TX’, Nov. 30-Dec. 4
-
G. J. Simmons, “High speed arithmetic utilizing redundant number systems”, in National Telecommunications Conf., ‘Houston, TX’, pp. 49.3.1-2, Nov. 30-Dec. 4, 1980.
-
(1980)
National Telecommunications Conf.
, pp. 49.3.1-2
-
-
Simmons, G.J.1
-
110
-
-
84939375001
-
Cryptology”
-
16th Edition. Chicago, IL: Encyclopaedia Britannica
-
G. J. Simmons, “Cryptology”, in Encyclopaedia Britannica, 16th Edition. Chicago, IL: Encyclopaedia Britannica, 1986, pp. 913-924B.
-
(1986)
Encyclopaedia Britannica
, pp. 913-924B
-
-
Simmons, G.J.1
-
113
-
-
0019080452
-
A modification of the RSA public-key cryptosystem”
-
Nov.
-
H. C. Williams, “A modification of the RSA public-key cryptosystem”, IEEE Trans. Informal Theory, vol. IT-26, no. 6, pp. 726–729, Nov. 1980.
-
(1980)
IEEE Trans. Informal Theory
, vol.IT-26
, Issue.6
, pp. 726-729
-
-
Williams, H.C.1
-
114
-
-
84939337513
-
-
-, Eds., Advances in Cryptology-CRYPTO ‘85. Berlin, Germany: Springer-Verlag
-
Advances in Cryptology-CRYPTO ‘85. Berlin, Germany: Springer-Verlag, 1986.
-
(1986)
-
-
-
115
-
-
84992720189
-
Cryptography with cellular automata”
-
S. Wolfram, “Cryptography with cellular automata”, in Crypto ‘85 [114], pp. 429-432.
-
Crypto ‘85 [114]
, pp. 429-432
-
-
Wolfram, S.1
-
116
-
-
0020915188
-
Recent advances in the design and implementation of large integer factorization algorithms”
-
‘Oakland, Apr. 25-27
-
M. C. Wunderlich, “Recent advances in the design and implementation of large integer factorization algorithms”, in 1983 Symp. on Security and Privacy, ‘Oakland, CA, pp. 67-71, Apr. 25-27, 1983.
-
(1983)
1983 Symp. on Security and Privacy
, vol.CA
, pp. 67-71
-
-
Wunderlich, M.C.1
-
117
-
-
84939383133
-
A single-chip VLSI implementation of the discrete exponential public key distribution system”
-
‘Orlando, Nov.
-
K. Yiu and K. Peterson, “A single-chip VLSI implementation of the discrete exponential public key distribution system”, in COMAC ‘Government Microcircuit Applications Conference’, ‘Orlando, FL’, pp. 18-23, Nov. 1982.
-
(1982)
COMAC ‘Government Microcircuit Applications Conference’
, vol.FL’
, pp. 18-23
-
-
Yiu, K.1
Peterson, K.2
|