-
1
-
-
84935639054
-
A framework for the study of cryptographic protocols”
-
R. Berger, S. Kannan, and R. Peralta, “A framework for the study of cryptographic protocols”, in Advances in Cryptol-ogy-Proc. Crypto 85, pp. 87-103, 1985.
-
(1985)
Advances in Cryptol-ogy-Proc. Crypto 85
, pp. 87-103
-
-
Berger, R.1
Kannan, S.2
Peralta, R.3
-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms”
-
Feb.
-
D. Chaum, “Untraceable electronic mail, return addresses and digital pseudonyms”, in Comm. of the ACM, vol. 24, no. 2, pp. 84–88, Feb. 1981.
-
(1981)
Comm. of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
3
-
-
0010276082
-
-
Tech. Rep. TR-82-2, Dept. of Electrical Engineering and Computer Science, Univ. of Wisconsin, Milwaukee, Wl, Oct.
-
C. I. Davida, Chosen signature cryptanalysis of the RSA ‘MIT’ public key cryptosystem”, Tech. Rep. TR-82-2, Dept. of Electrical Engineering and Computer Science, Univ. of Wisconsin, Milwaukee, Wl, Oct. 1982.
-
(1982)
Chosen signature cryptanalysis of the RSA ‘MIT’ public key cryptosystem”
-
-
Davida, C.I.1
-
4
-
-
84976740532
-
Digital signatures with RSA and other public-key cryptosystems”
-
Apr.
-
D. E. Denning, “Digital signatures with RSA and other public-key cryptosystems”, in Comm. of the ACM, vol. 27, pp. 388–392, Apr. 1984.
-
(1984)
Comm. of the ACM
, vol.27
, pp. 388-392
-
-
Denning, D.E.1
-
5
-
-
0020720357
-
On the security of public key protocols”
-
Mar.
-
D. Dolev and A. C. Yao, “On the security of public key protocols”, IEEE Trans. Informat. Theory, vol. IT-29, no. 2, pp. 198–208, Mar. 1983.
-
(1983)
IEEE Trans. Informat. Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
6
-
-
0008538346
-
A further weakness in the common modulus protocol for the RSA cryptoalgorithm”
-
July
-
J. M. DeLaurentis, “A further weakness in the common modulus protocol for the RSA cryptoalgorithm”, Cryptologia, vol. 8, no. 3, pp. 253–259, July 1984.
-
(1984)
Cryptologia
, vol.8
, Issue.3
, pp. 253-259
-
-
DeLaurentis, J.M.1
-
7
-
-
0021002191
-
Applied cryptology, cryptographic protocols, and computer security models”
-
R. A. DeMillo, C. L. Davida, D. P. Dobkin, M. A. Harrison, and R. J. Lipton, “Applied cryptology, cryptographic protocols, and computer security models”, in Proc. Symposia in Applied Mathematics, vol. 29, 1983.
-
(1983)
Proc. Symposia in Applied Mathematics
, vol.29
-
-
DeMillo, R.A.1
Davida, C.L.2
Dobkin, D.P.3
Harrison, M.A.4
Lipton, R.J.5
-
8
-
-
0020705956
-
Protocols for data security”
-
Feb.
-
R. A. DeMillo and M.J. Merritt, “Protocols for data security”, Computer, vol. 16, no. 2, pp. 39–50, Feb. 1983.
-
(1983)
Computer
, vol.16
, Issue.2
, pp. 39-50
-
-
DeMillo, R.A.1
Merritt, M.J.2
-
9
-
-
85030458019
-
A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes”
-
Y. Desmedt and A. M. Odylzko, “A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes”, in Advances in Cryptology-Proc. Crypto 85, pp. 516-522, 1985.
-
(1985)
Advances in Cryptology-Proc. Crypto 85
, pp. 516-522
-
-
Desmedt, Y.1
Odylzko, A.M.2
-
10
-
-
84939322823
-
On the security of ping-pong protocols using the RSA”
-
S. Even, O. Coldreich, and A. Shamir, “On the security of ping-pong protocols using the RSA”, in Advances in Cryptology-Proc. Crypto 85, pp. 58-72, 1985.
-
(1985)
Advances in Cryptology-Proc. Crypto 85
, pp. 58-72
-
-
Even, S.1
Coldreich, O.2
Shamir, A.3
-
11
-
-
85034631664
-
On using RSA with low exponent in a public key network”
-
J. Hastad, “On using RSA with low exponent in a public key network”, in Advances in Cryptology-Proc. Crypto 85, pp. 403-408, 1985.
-
(1985)
Advances in Cryptology-Proc. Crypto 85
, pp. 403-408
-
-
Hastad, J.1
-
12
-
-
0019565822
-
Fast implementation of the knapsack cipher”
-
P. S. Henry, “Fast implementation of the knapsack cipher”, B.S.T.J., vol. 60, pp. 767–773, 1981.
-
(1981)
B.S.T.J.
, vol.60
, pp. 767-773
-
-
Henry, P.S.1
-
13
-
-
84939323020
-
High speed hardware implementation of the knapsack cipher”
-
presented at Crypto 81, Aug.
-
P. S. Henry and R. D. Nash, “High speed hardware implementation of the knapsack cipher”, presented at Crypto 81, Aug. 1981.
-
(1981)
-
-
Henry, P.S.1
Nash, R.D.2
-
15
-
-
0020923149
-
Message authentication with manipulation detection codes”
-
R. R. Jueneman, S. M. Matyas, and C. H. Meyer, “Message authentication with manipulation detection codes”, in Proc. 1983 Symp. on Security and Privacy, pp. 33-54, 1982.
-
(1982)
Proc. 1983 Symp. on Security and Privacy
, pp. 33-54
-
-
Jueneman, R.R.1
Matyas, S.M.2
Meyer, C.H.3
-
16
-
-
0023295108
-
The interrogator: Protocol security analysis”
-
Feb.
-
J. K. Millen, S. C. Clark, and S. B. Freedman, “The interrogator: Protocol security analysis”, IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 274–288, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.SE-13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
17
-
-
34250244723
-
Factoring polynomials with integer coefficients”
-
A. K. Lenstra, H. W. Lenstra, and L. Lovasz, “Factoring polynomials with integer coefficients”, Mathematische Annalen, vol. 261, pp. 513–534, 1982.
-
(1982)
Mathematische Annalen
, vol.261
, pp. 513-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovasz, L.3
-
18
-
-
0004256761
-
Cryptographic protocols”
-
Georgia Institute of Technology, GIT-ICS-83/06,1983.
-
M. J. Merritt, “Cryptographic protocols”, Ph.D.Thesis, Georgia Institute of Technology, GIT-ICS-83/06,1983.
-
Ph.D.Thesis
-
-
Merritt, M.J.1
-
20
-
-
84939357844
-
Telecommunications: Interoperability and security replacements for the use of the data encryption standard in the physical and data link layers of data communications”
-
Proposed Federal Standard 1026, Washington, DC, Draft of June 1
-
Proposed Federal Standard 1026, “Telecommunications: Interoperability and security replacements for the use of the data encryption standard in the physical and data link layers of data communications”, National Communications System, Washington, DC, Draft of June 1, 1981.
-
(1981)
National Communications System
-
-
-
21
-
-
0343349510
-
A ‘weak’ privacy protocol using the RSA cryptoalgorithm”
-
C. J. Simmons, “A ‘weak’ privacy protocol using the RSA cryptoalgorithm”, Cryptologia, vol. 7, pp. 180–182, 1983.
-
(1983)
Cryptologia
, vol.7
, pp. 180-182
-
-
Simmons, C.J.1
-
22
-
-
0020279298
-
Forward search as a cryptanalytic tool against a public key privacy channel”
-
G. J. Simmons and D. B. Holdridge, “Forward search as a cryptanalytic tool against a public key privacy channel”, in Proc. 1982 Symp. on Security and Privacy, pp. 117-128, 1982.
-
(1982)
Proc. 1982 Symp. on Security and Privacy
, pp. 117-128
-
-
Simmons, G.J.1
Holdridge, D.B.2
|