About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Phreak
Broadcast Technology
Computer Technology
Cryptography
Science & Technology
Space, Astronomy, NASA
Telecommunications
The Internet: Technology of Freedom
Viruses
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

A Bibliography of Encryption Texts

This section cites publications on the theoretical and practical aspects of cryptography, cryptanalysis, and cryptographic protocols.

"American Council of Education Report on the Public Cryptography Study Group," Communications of the ACM, July 1981, pp, 435-450.

Key Words: policy, research.

Adams, C.M. "Security-Related Comments Regarding McEliece's PublicKey Cryptosystem," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM- 88), pp. 224-228.

Key Words: evaluation, public-key.

Adleman, L.M., "On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 303-313.

Key Words: analysis, knapsack.

Adleman, L.M. "Implementing an Electronic Notary Public," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 259-265.

Key Words: signatures, design.

Adleman, L.M. "On Breaking Generalized Knap-sack Public-key Cryptosystems," Proceedings, 15th ACM Symposium on Theory of Computing, 1983, pp. 402-412.

Key Words: analysis, knapsack.

Agnew, G.B. "Random Sources for Cryptographic Systems," Proc. Eurocrypt '87, Amsterdam, 1987, (8: CHA-88a), pp. 77-81.

Key Words: random, techniques.

Agnew, G.B., R.C. Mullin, and S.A. Vanstone "An Interacrtive Data Exchange Protocol Based on Discrete Exponentionation," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 159-176.

Key Words: methods, protocols.

Ahituv, N., Y. Lapid, and S. Neumann "Processing Encrypted Data," Communications of the ACM, September 1987, pp. 777-780.

Key Words: techniques.

Akl, S.G. "Digital Signatures with Blindfolded Arbitrators Who Cannot Form Alliances," Proc. 1982 IEEE Symp. Sec. and Privacy, (5: IEE-82), pp. 129-135.

Key Words: signatures, methods.

AKL-83

Akl, S.G. "On the Security of Compressed Encodings," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA- 84b), pp. 209-230.

Key Words: analysis, codes.

AKL-83a

Akl, S.G.

"Digital Signatures: Tutorial Survey," IEEE Computer, February 1983, pp. 14-24.

Key Words: signatures, general.

AKL-84

Akl, S.G., and H. Meijer "A Fast Pseudo Random Permu-tation Generator with Applica-tions to Cryptography," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 269- 275.

Key Words: random, techniques.

ALP-83

Alpern, B., and B. Schneider "Key Exchange Using `Keyless Cryptography'," Information Processing Letters, 1983, pp. 79-81.

Key Words: keys, techniques.

AMI-81

Amirazizi, H.R., E.D. Karnin, and J.M. Reyneri "Compact Knapsacks are Polyno-mially Solvable," Proc. Crypto '81, Santa Barbara, CA, 1981, (8: GER- 82), pp. 17-24.

Key Words: analysis, knapsack.

AND-82

Andelman, D., and J. Reeds "On the Cryptanalysis of Rotor Machines and Substitution-Permutation Networks," IEEE Trans. on Inform. Theory, No. 4, 1982, pp. 578-584.

Key Words: analysis, hardware.

ASM-83

Asmuth, C., and J. Blum "A Modular Approach to Key Safeguarding," IEEE Trans. on Inform. Theory, March 1983, pp. 208-210.

Key Words: methods, keys.

AVA-88

Avarne, S. "Cryptography -- Combatting Data Compromise," Security Management, October 1988, pp. 38-43.

Key Words: threats, methods.

AYO-83

Ayoub, F. "The Design of Complete Encryption Packages Using Cryptographically Equivalent Permutations," Computers & Security, November 1983, pp. 261-267.

Key Words: methods, design.

BAL-85

Baldwin, R.W., and W.C. Gramlich "Cryptographic Protocol for Trustable Match Making," Proc. 1985 IEEE Symp. Sec. and Privacy, (5: IEE-85), pp. 92-100.

Key Words: protocols, methods.

BAN-83

Banary, I., and Z. Furedi "Mental Poker with Three or More Players," Information and Control, 1983, pp. 84-93.

Key Words: protocols, methods.

BEK-82

Beker, H., and F. Piper Cipher Systems: The Protection of Communications, J. Wiley & Sons, New York, 1982.

Key Words: book, techniques, methods, general.

BEL-89

Bellare, M., and S. Goldwasser "New Paradigms for Digital Signatures for Smart Cards," Proc. Crypto '89, Santa Barbara, CA, (8: BRA-90), 1989.

Key Words: signatures, methods.

BEN-82 Bennett, C.H., et al. "Quantum Cryptography, or Unforgeable Subway Tokens," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 267-275.

Key Words: authentication, case.

BEN-84

Bennet, C.H., and G. Brassard "Update on Quantum Cryptography," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 475- 480.

Key Words: techniques, methods.

BEN-85

Bennet, C.H., G. Brassard, and J.-M. Robert "How to Reduce Your Enemy's Information," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 468-476.

Key Words: methods, theory.

BEN-86

Benaloh, J.C. "Cryptographic Capsules: A Disjunctive Primitive for Interactive Protocols," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 213-222.

Key Words: methods, protocols.

BEN-86a

Benaloh, J.C. "Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL- 87), pp. 251-260.

Key Words: methods, protocols.

BEN-87

Bennett, J. "Analysis of the Encryption Algorithm Used in the WordPerfect Word Processing Program," Cryptologia, October 1987, pp. 206-210.

Key Words: methods, case.

BEN-89

Bender, A., and G. Castagnoli "On the Implementation of Elliptic Curve Cryptosystems," Proc. Crypto '89, Santa Barbara, CA, (8: BRA-90), 1989.

Key Words: methods, theory.

BER-84

Berger, R., et al. "A Provably Secure Oblivious Transfer Protocol," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 379- 386.

Key Words: oblivious, protocols.

BER-85

Berger, R., et al. "A Framework for the Study of Cryptographic Protocols," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL- 86), pp. 87-103.

Key Words: model, protocols.

BET-82

Beth, T., and T. Ioth "Algorithm Engineering for Public Key Algorithms," Proc. 1982 IEEE Symp. Sec. & Priv., (5: IEE-82), pp. 458-466.

Key Words: algorithms, design.

BET-83

Beth, T. (Ed.) Cryptography, Proceedings, Burg Feuerstein Conference 1982, Lecture Notes in Computer Science, Springer Verlag, Berlin, 1983.

Key Words: proceedings, general.

BET-86

Beth, T., et al. (Eds.) Advances in Cryptology, Proceedings, Eurocrypt '85, Linz, Austria, April 1985, Lecture Notes in Computer Science, Vol. 209 Springer- Verlag, New York, 1986

Key Words: proceedings, general.

BET-88

Beth, T. "Efficient Zero-Knowledge Identication Scheme for Smart Cards," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 77-84.

Key Words: authentication, zero.

BEU-87

Beutelspacher, A. "Perfect and Essentially Perfect Authentication Schemes," Proc. Eurocrypt '87, Amsterdam, 1987, (8: CHA-88a), pp. 167-170.

Key Words: authentication, methods.

BLA-80

Blakely, G.R. "One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems," Proc. 1980 IEEE Symp. Sec. & Priv., (5: IEE-80), pp. 108-113.

Key Words: methods, keys.

BLA-80a

Blakely, G.R. "Safeguarding Cryptographic Keys," Proc. 1980 IEEE Symp. Sec. & Priv., (5: IEE- 80), pp. 108-113.

Key Words: methods, keys,

BLA-84

Blakely, G.R., and D.L. Chaum (Eds.) Advances in Cryptology: Crypto '84, Santa Barbara, CA, August 1984, Lect. Notes in Comp. Sci., No. 196, Springer-Verlag, Berlin, 1984.

Key Words: proceedings, general.

BLA-84a

Blakely, G.R., and C. Meadows "Security of Ramp Schemes," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA- 84a), pp. 242-268.

Key Words: analysis, methods.

BLA-84b

Blakely, G.R. "Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group- Theoretic Objects," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 314-338.

Key Words: analysis, theory.

BLA-85

Blakely, G.R. "Information Theory Without the Finiteness Assumption, II: Unfolding the DES," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 282-337.

Key Words: DES, analysis, theory.

BLA-85a

Blakely, G.R., C. Meadows, and G.B. Purdy "Fingerprinting Long Forgiving Messages," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 180-189.

Key Words: methods, theory.

BLA-86

Blakely, G.R., and R.D. Dixon "Smallest Possible Message Expansion in Threshold Schemes," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 266-274.

Key Words: methods, theory.

BLA-87

Blakely, G.R., and W. Rundell "Cryptosystems Based on an Analog of Heat Flow," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 306-329

Key Words: models, methods.

BLO-82

Blom, R. "Non-Public-key Distribution," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 231-236.

Key Words: keys, management.

BLO-84

Blom, R. "An Upper Bound on the Key Equivocation for Pure Ciphers," IEEE Trans. on Inform. Theory, 1984, pp. 82-84.

Key Words: methods, theory.

BLO-84a

Blom, R. "An Optimal Class of Symmetric Key Generation Systems," Proc. Eurocrypt '84, Paris, 1984, (8: BET- 85), pp. 335-338.

Key Words: keys, theory.

BLU-82 Blum, M. "Coin Flipping by Telephone," Proc., IEEE Spring Computer Conference, 1982, pp. 133-137.

Key Words: protocols, case.

BLU-83 Blum, M. "How to Exchange (Secret) Keys," ACM Trans. on Computer Systems, May 1983, pp. 175-193.

Key Words: protocols, keys.

BLU-84 Blum, M., and S. Micali "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits," SIAM Journal of Computation, November 1984.

Key Words: mathods, random.

BLU-84a Blum, M., and S. Goldwasser "An Efficient Probabiliastic Public-Key Encryption Scheme which Hides All Partial Infromation," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 289-299.

Key Words: algorithm, zero.

BOO-85 Book, R.V., and F. Otto "The Verifiability of Two- Part Protocols," Proc. Eurocrypt '85, Linz, 1985, (8: PIC-86), pp. 254-260.

Key Words: verification, protocols.

BRA-81 Brassard, G. "A Time-Luck Tradeoff in Relativized Cryptography," Journal of Computer and System Science, 1981, pp. 280-311.

Key Words: methods, design.

BRA-82 Brassard, G. "On Computationally Secure Authentication Tags Requiring Short Shared Keys," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 79-85.

Key Words: authentication, keys.

BRA-83 Brassard, G. "A Note on the Complexity of Cryptography," IEEE Trans. on Informat. Theory, November 1983, pp. 232-233.

Key Words: complexity, theory.

BRA-83a Brassard, G. "Relativized Cryptography," IEEE Trans. on Inform. Theory, 1983, pp. 877-894.

Key Words: methods, general.

BRA-86 Brassard, G., and C. Crepeau "Non-Transitive Transfer of Confidence: A Perfect Zero- Knowledge Interactive Protocol for SAT and Beyond," Proceedings, 27th IEEE Annual Symposium on the Foundations of Computer Science, 1986, pp. 188-195.

Key Words: protocols, zero.

BRA-86a Brassard, G., C. Crepeau, and J.-M. Robert "All-Or-Nothing Disclosure of Secrets," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 234-238.

Key Words: methods, theory.

BRA-88 Brandt, J., I.B. Damgard, and P. Landrock "Anonymous and Verifiable Registration in Databases," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 167- 76.

Key Words: authentication, methods, theory.

BRA-88a Brassard, G. Modern Cryptology: A Tutorial, Lecture Notes in Computer Science No. 325, Springer-Verlag, New York, NY, 1988

Key Words: book, general.

BRA-90 Brassard, G. Advances in Cryptology, Proceedings of Crypto-89, Santa Barbara, CA, August 1989, Lecture Notes in Computer Science, Springer Verlag, Berlin, 1990.

Key Words: proceedings, general.

BRI-82 Brickell, E.F. "A Fast Modular Multiplication Algorithm with Application to Two-Key Cryptography," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 51- 60.

Key Words: RSA, techniques.

BRI-82a Brickell, E.F., J.A. Davis, and G.J. Simmons "A Preliminary Report on the Cryptanalysis of Merkle- Hellman Knapsack Cryptosystems," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 289-301.

Key Words: analysis, knapsack.

BRI-83 Brickell.E.F. "Solving Low Density Knapsacks" Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA-84b), pp. 25-38.

Key Words: analysis, knapsack.

BRI-83a Brickell, E.F., and G.J. Simmons "A Status Report on Knapsack Based Public-key Cryptosystems," Congressus Numerantium, Vol. 37, 1983, pp. 3-72.

Key Words: analysis, knapsack.

BRI-84 Brickell, E.F. "A Few Results in Message Authentication" Congress Numerantium, December 1984, pp. 141-154.

Key Words: authentication, methods, theory.

BRI-84a Brickell, E.F. "Breaking Iterated Knapsacks," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 342- 358.

Key Words: analysis, knapsack.

BRI-85 Brickell, E.F., and J.M. DeLaurentis "An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL- 86), pp. 28-32.

Key Words: analysis, signatures.

BRI-86 Brickell, E.F., J.H. Moore, and M.R. Purtill "Structure in the S-Boxes of the DES," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 3-32.

Key Words: DES, analysis.

BRI-87 Brickell, e.F. "On Privacy Homomorphisms," Proc. Eurocrypt '87, Amsterdam, 1987, (8: CHA-88a), pp. 117- 125.

Key Words: methods, theory.

BRI-87a Brickell, E.F., et al. "Gradual and Verifiable Release of a Secret," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 156-166.

Key Words: verification, methods.

BRI-87b Brickell, E.F., P.J. Lee, and Y. Yacobi "Secure Audio Teleconference," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 418- 426.

Key Words: techniques, design.

BRI-88 Brickell, E.F., and A.M. Odlyzko "Cryptanalysis: A Survey of Recent Results," Proceedings of the IEEE, May 1988, pp. 578-593.

Key Words: analysis, methods.

BRI-88a Brickell, E.F., and D.R. Stinson "Authentication Codes with Multiple Arbitrers," Proc. Eurocrypt '87, Amsterdam, 1987, (8: CHA-88a), pp. 51- 55.

Key Words: authentication, codes.

BRI-89 Brickell, E.F., and D.M. Davenport "On the Classification of Ideal Secret Sharing Systems," Proc. Crypto '89, Santa Barbara, CA, (8: BRA- 90), 1989.

Key Words: methods, theory.

BUC-82 Buck, R.C. "The Public Cryptography Study Group," Computers & Security, November 1982, pp. 249-254.

Key Words: policy, research.

BUC-88 Buchmann, J., and H.C. Williams "A Key-Exchange System Based on Imaginary Quadratic Fields," Journal of Cryptology, Vol. 1, No. 2, 1988, pp. 107-118.

Key Words: methods, keys, theory.

BUC-89 Buchmann, J.A., and H.C. Williams "A Key Exchange System Based on Real Quadratic Fields," Proc. Crypto '89, Santa Barbara, CA, (8: BRA- 90), 1989.

Key Words: methods, keys, theory.

CAD-86 Cade, J.J. "A Modification of A Broken Public-Key Cipher," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 64-83.

Key Words: methods, design.

CAR-86 Carroll, J.M., and S. Martin "The Automated Cryptanalysis of Substitution Ciphers," Cryptologia, October 1986, pp. 193-209.

Key Words: analysis, methods.

CAR-87 Carroll, J.M., and L. Robbins "The Automated Cryptanalysis of Polyalphabetic Ciphers," Cryptologia, October 1987, pp. 193-205.

Key Words: analysis, methods.

CAR-88 Carroll, J.M., and L.E. Robbins "Using Binary Derivatives to Test an Enhancement of DES," Cryptologia, October 1988, pp. 193-208.

Key Words: DES, evaluation.

CHA-81 Chaum, D.L. "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Communications of the ACM, February 1981, pp. 84-88.

Key Words: methods, protocols.

CHA-82 Chaum, D. "Blind Signatures for Untraceable Payments," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 199-203.

Key Words: signatures, theory.

CHA-83 Chaum, D., R.L. Rivest, and A.T. Sheridan (Eds.), Advances in Cryptology: Proc. of Crypto-82, Santa Barbara, CA, August 1982, Plenum Press, New York, 1983.

Key Words: proceedings, general.

CHA-84 Chaum, D. (Ed.), Advances in Cryptology: Proc. of Crypto-83, Sata Barbara, CA, August 1983, Plenum Press, New York, 1984.

Key Words: proceedings, general.

CHA-85 Chaum, D., and J.-H. Evertse "Cryptanalysis of DES with a Reduced Number of Rounds Sequences of Linear Factors in Block Ciphers," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 192-211.

Key Words: DES, analysis, design.

CHA-85a Chaum, D. "Security Without Identification: Transaction System to Make Big Brother Obsolete," Communications of the ACM, October 1985, pp. 1030-1044.

Key Words: techniques, theory.

CHA-86 Chaum, D., and J.-H. Evertse "A Secure and Privacy- Protecting Protocol for Transmitting Personal Infromation Between Organizations," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 118- 167.

Key Words: protocols, design.

CHA-86a Chaum, D. "Demonstrating the a Public Predicate Can Be Satisfied Without Revealing Any Infromation About How," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL- 87), pp. 195-199.

Key Words: protocol, theory, zero.

CHA-86b Chaum, D., et al. "Demonstrating Possession of a Discrete Logarithm Without Revealing It," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 200- 212.

Key Words: protocol, theory, zero.

CHA-87 Chaum, D., I.B. Damgard, and J. Van de Graaf "Multiparty Computations Ensuring of Each Party's Input and Correctness of the Result," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88),

Key Words: protocols, theory.

CHA-87a Chaum, D. "Blinding for Unaticipated Signatures," Proc. Eurocrypt '87, Amsterdam, 1987, (CHA-88a), pp. 227-233.

Key Words: signatures, methods.

CHA-87b Chaum, D., J.-H. Evertse, and J. van de Graaf "An Improved Protocol for Demonstrating Posession of a Discrete Logarithm and Some Generalizations," Proc. Eurocrypt '87, Amsterdam, 1987, (CHA-88a), pp. 127- 141.

Key Words: protocols, theory.

CHA-88 Chaum, D., and W.L. Price (Eds.) Advances in Cryptology: Eurocrypt '87 Proceedings, Amsterdam, April 1987, Lecture Notes in Computer Science No. 304, Springer- Verlag, New York, 1988.

Key Words: proceedings, general.

CHA-88a Chaum, D. "The Dining Cryptographers Problem: Unconditional Sender and Receiver Untraceability," Journal of Cryptology, Vol. 1, No. 1, 1988, pp. 65-75.

Key Words: protocols, theory.

CHA-88b Chaum, D. "Elections with Unconditionally Secret Ballots and Disruption Equivalent to Breaking RSA," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 177-182.

Key Words: RSA, protocols.

CHA-89 Chaum, D. "Undeniable Signatues" Proc. Crypto '89, Santa Barbara, CA, (8: BRA-90), 1989.

Key Words: signatures, methods.

CHA-89a Chaum, D. "The Spymaster's Double- Agent Problem: Multiparty Computations Secure Unconditionally from All Minorities and Cryptographically from Majorities," Proc. Crypto '89, Santa Barbara, CA, (8: BRA- 90), 1989.

Key Words: protocols, theory.

CHO-84 Chor, B. and R.L. Rivest "A Knapsack Type Public- key Cryptosystem Based on Arith metic in Finite Fields," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA- 84a), pp. 54-65.

Key Words: methods, knapsack.

CHO-85 Chor, B., et al. "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults," Proceedings, 26th IEEE Annual Symposium on the Foundations of Comp. Sci., 1985, pp. 383-395.

Key Words: protocols, methods.

CHO-88 Chor, B., and R.L. Rivest "A Knapsack-Type Public- key Cryptosystem Based on Arithmetic in Finite Fields," IEEE Trans. on Inform. Theory, September 1988, pp. 901-909.

Key Words: methods, knapsack, theory, public-key.

CHO-89 Chor, B., and E. Kushilevitz "Secret Sharing over Infinite Domains," Proc. Crypto '89, Santa Barbara, CA, 1989, (8: BRA-90).

Key Words: methods, theory.

CLJ-84 "Government and Cryptography," Computer/Law Journal, Winter 1984, pp. 573-603.

Key Words: policy, research.

COH-85 Cohen, J., and M. Fischer "A Robust and Verifiable Cryptographically Secure Election System," Proceedings, 26th IEEE Symposium on Foundations of Computing, 1985, pp. 372- 382.

Key Words: methods, protocols.

COO-80 Cooper, R.H. "Linear Transformations in Galois Fields and Their Applications to Cryptography," Cryptologia, Vol. 4, 1980, pp. 184-188.

Key Words: algorithms, theory.

COO-84 Cooper, R.H., W. Hyslop, and W. Patterson "An Application of the Chinese Remainder Theorem to Multiple-Key Encryption in Data Base Systems," Proc. IFIP/Sec. '84, Toronto, 1984, (2: FIN-85), pp. 553-556.

Key Words: methods, theory.

COP-84 Coppersmith, D. "Another Birthday Attack," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL- 86), pp. 14-17.

Key Words: analysis, methods.

COP-85 Coppersmith, D. "Cheating at Mental Poker," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL- 86), pp. 104-107.

Key Words: threats, protocols.

COP-87 Coppersmith, D. "Cryptography," IBM Journal of Research and Development, March 1987, pp. 244-248.

Key Words: methods, general.

COS-81 Costas, J.P. "The Hand-Held Calculator as a Cryptographic Terminal," Cryptologia, April 1981, pp. 94-117.

Key Words: methods, hardware.

CRE-85 Crepeau, C. "A Secure Poker Protocol that Minimizes the Effect of Player Coalitions," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 73-86.

Key Words: methods, protocols.

CRE-87 Crepeau, C. "Equivalence Between Two Flavors of Oblivious Transfer," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 350-354.

Key Words: oblivious, theory.

DAV-80 Davies, D.W., W.L. Price, and G.I. Parkin "Evaluation of Public-key Cryptosystems," Information Privacy (U.K.), March 1980, pp. 138-154.

Key Words: evaluation, public-key.

DAV-80a Davies, D.W., and D.A. Bell "Protection of Data by Cryptography," Information Privacy, (U.K.), May 1980, pp. 106-125.

Key Words: techniques, case.

DAV-82 Davies, D.W. "Some Regular Properties of Data Encryption Standard Algorithm," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 89-96.

Key Words: DES, analysis.

DAV-82a Davies, D.W., and G.I.P. Parkin "The Average Cycle Size of the Key Stream in Output Feedback Encipherment," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA- 83b), pp. 97-98.

Key Words: DES, analysis.

DAV-82b Davida, G.I., and Y.Yeh "Cryptographic Relational Algebra," Proc. 1982 IEEE Symp. Sec. & Privacy, (5: IEE-82), 1982, pp. 111-116

Key Words: algorithms, theory.

DAV-83 Davies, D.W. "Use of the `Signature Token' to Create a Negotiable Document, Proc. Crypto '83, Santa Barbara, CA, (8: CHA-84b), 1983, pp. 377-382.

Key Words: signatuers, methods.

DAV-83a Davis, J.A., and D.B. Holdridge "Factorization Using the Quadratic Sieve Algorithm," Proc. Crypto '83, Santa Barbara, CA, (8: CHA-84b), 1983, pp. 103-113.

Key Words: analysis, techniques.

DAV-83b Davio, M., et al., "Analytical Characteristics of the DES," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA-84b), pp. 171-202.

Key Words: DES, analysis, methods.

DAV-84 Davio, M., Y. Desmedt, and J.-J. Quisquater "Propagation Characteristics of the DES" Proc. Eurocrypt '84, Paris, 1984, (8: BET- 85), pp. 62-73.

Key Words: DES, analysis.

DAV-84a Davis, J.A., D.B. Holdridge, and G.J. Simmons "Status Report on Factoring (At the Sandia Laboratories)," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 183- 215.

Key Words: RSA, analysis, methods.

DAV-87 Davida, G.I., and G.G. Walter "A Public-key Analog Cryptosystem," Proc. Eurocrypt '87, Amsterdam, 1987, (CHA-88a), pp. 144- 147.

Key Words: methods, public- key.

DAV-87a Davida, G.I, and B.J. Matt "Arbitration in Tamper Proof Systems," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 216-222.

Key Words: signatures, methods.

DAV-87b Davida, G.I., and F.B. Dancs "A Crypto-Engine," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 257-268.

Key Words: methods, design.

DAV-88 Davis, J.A, and D.B. Holdridge "Factorization of Large Integers on a Massively Parallel Computer," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 235-243.

Key Words: analyis, techniques.

DEA-87 Deavours, C.A., Cryptology Yesterday, Today and Tomorrow, Artech House, Norwood, MA, 1987.

Key Words: book, general.

DEA-89 Deavours, C.A., et al. (Eds.) Cryptology: Machines, History, and Methods, Artech House, Norwood, MA, 1989.

Key Words: book, general.

DEJ-85 deJonge, W., and D. Chaum "Attacks on Some RSA Signatures," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 18-27.

Key Words: RSA, analysis, signatures.

DEJ-86 de Jonge, W., and D. Chaum "Some Variations on RSA Signatures & Their Security," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL- 87), pp. 49-59.

Key Words: RSA, signatures.

DEL-84 DeLAurentis, J.M. "A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm," Cryptologia, July 1984, pp. 253-259.

Key Words: RSA, analysis, threats, protocols.

DEL-84a Delsarte, P., et al. "Fast Cryptanalysis of Matsumoto-Imai Public-key Scheme," Proc. Eurocrypt '84, Paris, 1984, (8: BET- 85), pp. 142-149.

Key Words: analysis, public- key.

DEM-82 DeMillo, R., N. Lynch, and M. Merritt "Cryptographic Protocols," Proc., 14th ACM Symposium on Theory of Computation, 1982, pp. 383-400.

Key Words: protocols, general.

DEM-83 DeMillo, R.A., et al. "Applied Cryptology, Cryptographic Protocols, and Computer Security Models," Proceedings, 29th Symposium on Applied Mathematics, American Mathematical Soc., 1983.

Key Words: models, protocols.

DEM-83a DeMillo, R., and M. Merritt "Protocols for Data Security," IEEE Computer, February 1983, pp. 39-50.

Key Words: protocols, general.

DEN-82 Denning, D.E. Cryptography and Data Security, Addison-Wesley, Reading, MA, 1982.

Key Words: book, methods, models.

DEN-83 Denning, D.E., "The Many-Time Pad: Theme and Variations," Proc. 1983 IEEE Symp. Sec. & Priv., (5: IEE-83a), pp. 23-30.

Key Words: techniques, case.

DEN-84 Denning, D.E. "Digital Signatures with RSA and Other Public-Key Cryptosystems," Communications of the ACM, April 1984, pp. 388- 392.

Key Words: RSA, signatures.

DEN-88 Den Boer, B. "Cryptanalysis of F.E.A.L.," Proc. Crypto '88, Santa Barbara, CA, 1988, pp. 293- 299.

Key Words: analysis, algorithm.

DES-84 Desmedt, Y.G., et al. "A Critical Analysis of Security of Knapsack Public- key Algorithms," IEEE Trans. on Inform. Theory, July 1984, pp. 601-611.

Key Words: analysis, knapsack.

DES-84a Desmedt, Y., et al. "Dependence of Output on Input in DES: Small Avalanche Characteristics," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA- 84a), pp. 359-376.

Key Words: DES, design, analysis.

DES-85 Desmedt, Y. "Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 42- 55.

Key Words: authentication, theory.

DES-85a Desmedt, Y., and A.M. Odlyzko "A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 516-522.

Key Words: RSA, analysis, threats.

DES-86 Desmedt, Y., and J.-J. Quisquater "Public-Key Systems Based on the Difficulty of Tampering," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 111- 117.

Key Words: public-key, design.

DES-86a Desmedt, Y. "Is There A Ultimate Use of Cryptography?," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 459- 463.

Key Words: policy, general.

DES-87 De Santis, A., S. Micali, and G. Persiano "Non-Interactive Zero- Knowledge Proof Systems," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM- 88), pp. 52-72

Key Words: theory, zero.

DES-87a Desmedt, Y.G., et al. "Special Uses and Abuses of the Fiat-Shamir Passport Protocol" Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 21-39

Key Words: thretas, protocols.

DES-87b Desmedt, Y.G. "Society and Group Oriented Cryptography: A New Concept," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 120-127.

Key Words: policy, methods.

DES-88 Desmedt, Y.G. "Subliminal-Free Authentication and Signature," Proc. Crypto '88, Santa Barbara, CA, 1988, pp. 23-33.

Key Words: authentication, methods.

DES-88a De Soete, M. "Some Constructions for Authentication-Secrecy Codes," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 57-75.

Key Words: authentication, codes.

DES-89 Desmedt, Y.G. "Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context," Proc. Crypto '89, Santa Barbara, CA, (8: BRA-90), 1989.

Key Words: methods, design.

DIF-81 Diffie, W. "Cryptographic Technology: Fifteen Year Forecast," Proc. Crypto '81, Santa Barbara, CA, 1981, (8: GER-82), pp. 84-108.

Key Words: methods, gneral.

DIF-88 Diffie, W. "The First Ten Years of Public-Key Cryptography," Proceedings of the IEEE, May 1988, pp. 560-577.

Key Words: public-key, methods.

DOL-81 Dolev, D., A.C. Yao "On the Security of Public Key Protocols," Proc., 22nd Annual Symp. on the Foundations of Comp. Sci., 1981.

Key Words: analysis, public- key.

DOL-82 Dolev, D., and A. Wigderson "On the Security of Multi- Party Protocols in Distributed Systems," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 167-175.

Key Words: analysis, protocols.

DOL-82a Dolev, D., S. Even, and R.M. Karp "On the Security of Ping- Pong Algorithms," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 177-186.

Key Words: analysis, algorithms.

DOL-83 Dolev, D., and A.C. Yao "On the Security of Public- key Protocols," IEEE Trans. on Inform. Theory, March 1983, pp. 198-208.

Key Words: analysis, protocols.

EIE-83 Eier, R., and H. Lagger "Trapdoors in Knapsack Cryptosystems," Proc. Burg Feuerstein Conf., 1982, (8: BET-83), pp. 316-322.

Key Words: analysis, knapsack.

ELG-82 ElGamal, T. "A Public-key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 10- 18.

Key Words: methods, signatures.

ELG-85 ElGamal, T. "A Public-key Cryptosystem and Signature Scheme Based on Discrete Logarithms," IEEE Trans. on Inform. Theory, July 1985, pp. 469- 472.

Key Words: methods, signatures.

ELK-83 El-Kateeb, A., and S. Al-Khayatt "Public-key Cryptosystems," Information Age (UK), October 1983, pp. 232-237.

Key Words: publi-key, general.

ESC-84 Escobar, C.B. "Nongovernmental Cryptology and National Security: The Government Seeking to Restrict Research," Computer/Law Journal, Winter 1984, pp. 573-603.

Key Words: policy, research.

EST-85 Estes, D., et al. "Breaking the Ong-Schorr- Shamir Signature Scheme for Quadratic Number Fields," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL- 86), pp. 3-13.

Key Words: analysis, signatures.

EVE-82 Even, S., O. Goldreich, and A. Lempel "A Randomized Protocol for Signing Contracts" Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 205-210.

Key Words: signatures, random, protocols.

EVE-85 Even, S., O. Goldreich, and A. Shamir "On the Security of Ping- Pong Protocols when Implemented Using the RSA," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 58-72.

Key Words: RSA, analysis, protocols.

EVE-85a Even, S., and O. Goldreich "On the Power of Cascade Ciphers," ACM Trans. on Computer Systems, 1985, pp. 108-116.

Key Words: evaluation, methods.

EVE-85b Even, S., O. Goldreich, and A. Lempel "A Randomized Protocol for Signing Contracts," Communications of the ACM, June 1985, pp. 637- 647.

Key Words: siagnatures, random.

EVE-87 Evertse, J.-H. "Linear Structures in Block Ciphers," Proc. Eurocrypt '87, Amsterdam, 1987, (CHA-88a), pp. 249-266.

Key Words: analysis, methods.

EVE-89 Even, S., O. Goldreich, and S. Micali "On Line/Off Line Digital Signatures," Proc. Crypto '89, Santa Barbara, CA, (8: BRA- 90), 1989.

Key Words: signatures, methods.

FAM-83 Fam, B.W. "Improving the Security of Exponential Key Exchange," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA- 84b), pp. 359-368.

Key Words: methods, keys.

FEI-85 Feigenbaum, J. "Encrypting Problem Instances," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 477-488.

Key Words: methods, theory.

FEI-88 Feige, U., A. Fiat, and A. Shamir "Zero-Knowledge Proofs of Identity," Journal of Cryptology, Vol. 1, No. 2, 1988, pp. 77-94.

Key Words: authentication, zero.

FEL-85 Fell, H., and W.Diffie "Analysis of a Public-key Approach Based on Polynomial Substitution," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL- 86), pp. 340-349.

Key Words: analysis, public- key.

FEL-87 Feldman, P. "A Practical Scheme for Non-Interactive Verifiable Secret Sharing," Proc., 28th IEEE Annual Symp. on the Foundation of Comp. Science, 1987, pp. 427-437.

Key Words: methods, protocols.

FIA-86 Fiat, A., and A. Shamir "How to Prove Yourself: Practical Solutions to Identification and Signature Problems," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 186-194.

Key Words: signatures, methods.

FIS-81 Fischer, E. "Measuring Cryptographic Performance with Production Processes," Cryptologia, July 1981, pp. 158-162.

Key Words: evaluation, methods.

FOR-84 Fortune, S. "Poker Protocols," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 454-464.

Key Words: protocols, case.

FOS-82 Foster, C.C. Cryptanalysis for Microcomputers, Hayden Book Co., Rochelle Park, NJ, 1982.

Key Words: book, PC, methods.

GAL-85 Galil, Z., S. Haber, and M. Yung "Symmetric Public-Key Encryption," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 128- 137.

Key Words: public-key, methods.

GAL-85a Galil, Z., S. Haber, and M. Yung "A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public- Key Cryptosystems," Proc., 26th IEEE Symposium on Foundations of Computing, 1985, pp. 360-371

Key Words: evaluation, public-key.

GEO-89 Georgiu, G. "A Method to Strengthen Ciphers," Cryptologia, April 1989, pp. 151.

Key Words: methods, techniques.

GER-82 Gersho, A. (Ed.) Advances in Cryptology: A Report on Crypto 81, August 1981, ECE Rept. No. 82-02, University of California, Santa Barbara, CA, August 20, 1982.

Key Words: proceedings, methods.

GIF-82 Gifford, D.K. "Cryptographic Sealing for Information Security and Authentication," Communications of the ACM, April 1982, pp. 274- 286.

Key Words: authentication, methods.

GIR-88 Girault, M., R. Cohen, and M. Campana "A Generalized Birthday Attack," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 129-156.

Key Words: analysis, threat.

GOD-85 Godlewski, P., and G.D. Cohen "Some Cryptographic Aspects of Womcodes," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 458- 467.

Key Words: methods, codes.

GOL-82 Goldwasser, S., S. Micali, and A. Yao "On Signatures and Authentication," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 211-215.

Key Words: signatures,

GOL-82a Goldwasser, S., and S. Micali "Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information," Proceedings, 14th Annual ACM Symp. on Theory of Computing, May 1982, pp. 365-377.

Key Words: methods, protocols.

GOL-82b Goldwasser, S., S. Micali, and P. Tong "How to Establish a Private Code on a Public Network," Proceedings, 23d Annual IEEE Symposium on Foundations of Computing, 1982, pp. 134-144.

Key Words: methods, codes.

GOL-83 Goldreich, O. "A Simple Protocol for Signing Protocols," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA-84b), pp. 133-135.

Key Words: signatures, protocols.

GOL-83a Goldwasser, S., S. Micali, and A. Yao "Strong Signature Schems," Proc., 15th Annual ACM Symp. on Theory of Comp., 1983, pp. 431-439.

Key Words: methods, signatures.

GOL-84 Goldreich, O., S. Goldwasser, and S. Micali "On the Cryptographic Applications of Random Functions," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 276-288.

Key Words: methods, random.

GOL-84a Goldreich, O. "On Concurrent Identification Protocols," Proc. Eurocrypt '84, Paris, 1984, (8: BET- 85), pp. 387-396.

Key Words: methods, protocols.

GOL-84b Goldwasser, S., and S. Micali "Probabilistic Encryption," Journal of Comp. and System Science, April 1984, pp. 270- 299.

Key Words: methods, theory.

GOL-85 Goldwasser, S., S. Micali, and R.L. Rivest "A `Paradoxical' Solution to the Signature Problem," Proc., 25d Annual IEEE Symp.on Found. of Comp., 1984, pp. 441-448.

Key Words: signatures, theory.

GOL-86 Goldreich, O. "Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme" Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 104-110.

Key Words: analysis, signatures.

GOL-86a Goldreich, O., S. Micali, and A. Wigderson "How to Prove All NP Statements in Zero- Knowledge and Methodology of Cryptographic Protocol Design," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 171-185.

Key Words: protocols, zero.

GOL-86b Goldreich, O. "Toward a Theory of Software Protection," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 426-439.

Key Words: software, theory.

GOL-87 Goldreich, O. "Towards a Theory of Software Protection and Simulation by Oblivious RAMs," Proceedings, 19th ACM Symposium on Theory of Computing, 1987, pp. 182- 194.

Key Words: theory, software.

GOL-87a Goldreich, O., and R. Vainish "How to Solve a Protocol Problem: An Efficiency Improvement," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 73- 86

Key Words: methods, protocols.

GOL-89 Goldwasser, S., et al. "Efficient Identification Schemes Using Two Prover Interactive Proofs," Proc. Crypto '89, Santa Barbara, CA, (8: BRA-90), 1989.

Key Words: authentication, methods.

GOO-84 Goodman, R.M.F., and A.J. McAuley "A New Trapdoor Knapsack Public-key Cryptosystem," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 150- 158.

Key Words: public-key, knapsack.

GOR-81 Gordon, J.A. "Towards a Design for Cryptosecure Susbstitution Boxes," Proc. Crypto '81, Santa Barbara, CA, 1981, (8: GER-82), pp. 53-63.

Key Words: methods, design.

GRO-84 Groscot, H. "Estimation of Some Encryption Functions Implemented into Smart Cards," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 470-479.

Key Words: analysis, methods.

GUA-87 Guam, P. "Cellular Automaton Public Key Cryptosystem," Complex Systems, 1987, pp. 51-56.

Key Words: methods, case.

GUI-88 Guillou, L.C., and J. Quisquater "A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory," Proc. Eurocrypt '88, Davos, 1988, (8: GUN- 89), pp. 123-128.

Key Words: design protocols, zero.

GUI-89 Guillou, L., et al. "Public-Key Techniques: Randomness and Redundancy," Cryptologia, April 1989, pp. 167.

Key Words: public-key, random

GUN-88 Gunther, C.G. "A Universal Algorithm for Homophonic Coding," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 405-414.

Key Words: algorithms, coding.

GUN-89 Gunther, C.G. Advances in Cryptology: Eurocrypt '88 Proceedings, Davos, Switzerland, May 1988, Lecture Notes in Comp. Science No. 330, Springer-Verlag, New York, 1989.

Key Words: proceedings, general.

HAR-83 Harari, S. "Secret Sharing Systems in Digital Communications," in Longo, G. (Ed.), Secure Digital Systems, Springer, Wien, 1983, pp. 105-110.

Key Words: techniques, design.

HAR-84 Harari, S. "Non-Linear Non- Commutative Functions for Data Integrity," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 25-32.

Key Words: integrity, theory.

HAR-89 Harn, L., and T. Keisler "Two New Efficient Cryptosystems Based on Rabin's Scheme: Alternatives to the RSA Cryptosystem," Proc. 5th Security Applicat. Conf., (4: IEE-89c), 1989, pp. 254-262.

Key Words: methods, public- key.

HEL-80 Hellman, M.E. "A Cryptoanalytic Time- Memory Tradeoff," IEEE Trans. on Inform. Theory, July 1980, pp. 401-406.

Key Words: analysis, design.

HEL-81 "On the Necessity of Cryptoanalytic Exhaustive Search," Proc. Crypto '81, Santa Barbara, CA, 1981, (8: GER-82), pp. 1-5.

Key Words: analysis, methods.

HEL-82 Hellman, M.E., and J.M. Reyneri "Distribution of Drainage in DES," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 129-131.

Key Words: DES, design, methods.

HEN-81 Henry, P.S. "Fast Encryption Algorithm for the Knapsack Cryptographic System," Bell System Technical Journal, May-June 1981, pp. 767-773.

Key Words: algorithm, knapsack.

HEP-86 Hepshey, J.E., R.K. Yarlanda Data Encryption and Protection, Plenum Press, New York, 1986.

Key Words: book, general.

HER-83 Herlestam, T. "On the Complexity of Certain Crypto Generators," Proc. IFIP/Sec. '83, Stockholm, 1983, (2: FAK- 83), pp. 305-308.

Key Words: complexity, methods.

HUA-88 Huang, Y.J., and F. Cohen "Some Weak Points of One Fast Cryptographic Checksum Algorithm and Its Improvement," Computers & Security, October 1988, pp. 503-505.

Key Words: vulnerabilities, algorithms, check-sum.

IMP-87 Impagliazzo, R., and M. Yung "Direct Minimum-Knowledge Computations," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 40- 51

Key Words: methods, zero.

ING-81 Ingemarsson, I., and C.K. Wong "A User Authentication Scheme for Shared Data Based on a Trap-Door One- Way Function," Information Processing Letters, April 13, 1981, pp. 63-67.

Key Words: authentication, trap-door, methods.

ING-82 Ingemarsson, I., D.T. Tang, and C.K. Wong "A Conference Key Distribution System" IEEE Trans. on Inform. Theory, 1982, pp. 714-720.

Key Words: methods, keys, case.

JAM-86 James, N.S., R. Lidl, and H. Niederreiter "Breaking the Cade Cipher," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL- 87), pp. 60-63.

Key Words: analysis, case.

JAM-88 Jamnig, P. "Securing the RSA- Cryptosystem Against Cycling Attacks," Cryptologia, July 1988, pp. 159-164.

Key Words: RSA, analysis, threats.

JAN-82 Janardan, R., and K.B. Lakshmanan "A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 21-37.

Key Words: public-key, methods.

JAN-87 Jansen, C.J.A., and D.E. Boekee "Modes of Block Cipher Algorithms and Their Protection Against Active Eavesdropper," Proc. Eurocrypt '87, Amsterdam, 1987, (8: CHA-88a), pp. 281- 286.

Key Words: therats, methods, algorithms.

JIN-88 Jingmin, H., and L. Kaicheng "A New Probabilistic Encryption Scheme," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 413-418.

Key Words: methods, design.

JOR-81 Jordan, J.P. "A Variant of a Public-key Cryptosystem Based on Goppa Codes," Proc. Crypto '81, Santa Barbara, CA, 1981, (8: GER-82), pp. 25- 30.

Key Words: methods, public- key.

JOR-87 Jorissen, F., J. Vandewalle, and R. Govaerts "Extension of Brickell's Algorithm for Breaking High Density Knapsacks," Proc. Eurocrypt '87, Amsterdam, 1987, (8: CHA-88a), pp. 109- 115.

Key Words: analysis, algorithms.

JUE-82 Jueneman, R.R. "Analysis of Certain Aspects of Output Feedback Mode," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA- 83b), pp. 99-127.

Key Words: DES, analysis, design.

JUE-83 Jueneman, R.R., S.M. Matyas, and C.H. Meyer, "Authentication with Manipulation Detection Codes," Proc. 1983 IEEE Symp. Sec. & Priv., (5: IEE- 83a), pp. 33-54.

Key Words: authentication, codes.

JUE-86 Juenemam, R.R. "A High Speed Manipulation Detection Code," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 327-346.

Key Words: methods, codes, threats.

JUR-83 Jurgensen, H., and D.E. Matthews "Some Results on the Information Theoretic Analyses of Cryptosystems," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA- 84b), pp. 303-356.

Key Words: analysis, theory, design.

KAH-80 Kahn, D. "Cryptography Goes Public," IEEE Communications Magazine, March 1980, pp. 19-28.

Key Words: public-key, general.

KAH-82 Kahn, D. "The Grand Lines of Cryptology's Development," Computers & Security, November 1982, pp. 245- 248.

Key Words: methods, general.

KAH-84 Kahn, D. Kahn on Codes, Macmillan, New York, 1984.

Key Words: book, general.

KAH-84a Kahn, D. "Cryptology and the Origins of Spread Spectrum," IEEE Spectrum, September 1984, pp. 70-80

Key Words: methods, general.

KAK-83 Kak, S.C. "Joint Encryption and Error Correction," Proc. 1983 IEEE Symp. Sec. & Privacy, (5: IEE-83a), pp. 55-60.

Key Words: methods, codes.

KAK-84 Kak, S.C. "On the Method of Puzzles for Key Distribution," Internat. Journal of Computer and Information Science, April 1984, pp. 103-109.

Key Words: methods, keys.

KAL-84 Kaliski, B.S. "Wyner's Analog Encryption Scheme: Results of a Simulation," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 83- 94.

Key Words:

KAL-85 Kaliski, B.S., Jr., R.L. Rivest, and A.T. Sherman "Is the Data Encryption Standard a Group?," Journal of Cryptology, Vol. 1, No. 1, 1988, pp. 3-36.

Key Words: DES, design, theory.

KAL-85a Kaliski, B.S. Jr, R.L. Rivest and A.T. Sherman "Is DES a Pure Cipher?," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL- 86), pp. 212-226.

Key Words: DES, design, theory.

KAR-83 Karnin, E.D., et al. "On Secret Sharing Systems," IEEE Trans. on Inform. Theory, 1983, pp. 35-41.

Key Words: methods, general.

KAR-84 Karnin, E.D. "A Parallel Algorithm for the Knapsack Problem," IEEE Trans. on Computers, May 1984, pp. 404-408.

Key Words: algorithm, knapsack.

KES-88 Kesim, S.N. "Encryption: Security with Ciphers," Security Management, October 1988, pp. 45-47.

Key Words: methods, general.

KOB-87 Koblitz, N. A Course in Number Theory and Cryptography, Springer, New York, 1987.

Key Words: book, general.

KOB-87a Koblitz, N. "Elliptic Curve Cryptosystems," Mathematics of Computation, 1987, pp. 203-209.

Key Words: methods, theory.

KOB-89 Koblitz, N. "Hyperelliptic Cryptosystem," Journal of Cryptology, Vol. 1, No. 3, 1989, pp. 139-150.

Key Words: methods, theory.

KON-80 Konheim, A.G., et al. "The IPS Cryptographic Programs," IBM Systems Journal, Vol. 19, No. 2, 1980, pp. 153-283.

Key Words: methods, software.

KON-81 Konheim, A.G. Cryptography - A Primer, J. Wiley & Sons, New York, 1981.

Key Words: book, general.

KON-84 Konheim, A.G. "Cryptanalysis of ADFGVX Encryption Systems," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 339-341.

Key Words: analysis, method, case.

KOT-84 Kothari, S.C. "Generalized Linear Threshold Scheme," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 231-241.

Key Words: methods, theory.

KOY-87 Koyama, K., and K. Ohta "Identity-Based Conference Key Distribution Systems," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM- 88), pp. 175-184.

Key Words: methods, keys.

KOY-88 Koyama, K., and K. Ohta "Security of Improved Identity-Based Key Distribution System," Proc. Eurocrypt-87, pp. 11-19.

Key Words: methods, keys.

KRA-86 Kranakis, E. Primality and Cryptography, Wiley, New York, 1986.

Key Words: book, general.

KUR-88 Kurosawa, K., T. Ito, and M. Takeuchi "Public Key Cryptosystem Using a Reciprocal Number with the Same Intractability as Factoring a Large Number," Cryptologia, October 1988, pp. 225-233.

Key Words: methods, public- key.

LAG-83 Lagarias, J.C. "Knapsack Public Key Cryptosystems and Diophantine Approximations," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA- 84b), pp. 4-23.

Key Words: public-key, knapsack.

LAI-89 Laih, C.-S., et al. "Linearly Shift Knapsack Public Key Cryptosystem," IEEE Journal on Selected Areas in Communications, May 1989, pp. 534-539.

Key Words: methods, knapsack.

LAK-83 Laksmivarahan, S. "Algorithms for Public-Key Cryptosystems: Theory and Applications," in M. Yovits, (Ed.), Advances in Computers, Vol. 22, Academic Press, New York, 1983, pp. 45-108.

Key Words: public-key, methods.

LAM-81 Lamport, L. "Pasword Authentication with Insecure Communications," Communications of the ACM, November 1981, pp. 770-772.

Key Words: authentication.

LEE-88 Lee, P.J., and E.F. Brickell "An Observation on the Security of McElice's Public- Key Cryptosystem, Proc. Eurocrypt '88, Davos, 1988 (8: GUN-89), pp. 275-280.

Key Words: analysis, public- key.

LEI-84 Leighton, A.C., and S.M. Matyas "The History of Book Ciphers," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 101-113.

Key Words: methods, general.

LEN-81 Lennon, R.E., et al. "Cryptographic Authentication of Time-Invariant Quantities," IEEE Trans. on Communications, June 1981, pp. 773-777.

Key Words: authentication.

LEU-84 Leung, A.K. "Sequenec Complexity as a Test for Cryptographic Systems," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 468-474.

Key Words: methods, complexity.

LEV-85 Levin, L. "One-Way Functions and Pseudo-random Generators," Proc., 17th Annual ACM Symp. on Theory of Computing, 1985, pp. 363- 365.

Key Words: Methods, one- way,

LEV-87 Levine, J., and R. Chandler "Some Further Applications of Permutation Polynomials," Cryptologia, October 1987, pp. 211-218.

Key Words: methods, theory.

LID-83 Lidl, R., and W.B. Muller "Permutation Polynomials in RSA Cryptosystems," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA-84b), pp. 293-301.

Key Words: RSA, methods, theory.

LID-84 Lidl, R. "On Cryptosystems Based on Polynomials and Finite Fields," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 10-15.

Key Words: methods, theory.

LON-82 Longpre, L. "The Use of Public-Key Cryptography for Signing Checks," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 187-197.

Key Words: signatures, public-key.

LUB-87 Luby, M., and C. Rackoff "A Study of Password Security," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 392-397.

Key Words: methods, general.

MAD-84 Madryga, W.E. "A High Performance Encryption Algorithm," Proc. IFIP/Sec. '84, Toronto, 1984, (2: FIN-85), pp. 557-570.

Key Words: methods, algorithm.

MAG-89 Magliveras, S.S., and N.D. Memon "Algebraic Properties of the PGM Cryptosystem" Proc. Crypto '89, Santa Barbara, CA, 1989 (8: BRA-89).

Key Words: methods, theory, case.

MAS-84 Massey, J.L., and R.A. Rueppel "Linear Ciphers and Random Sequence Generators with Multiple Clocks," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 74-87.

Key Words: methods, design.

MAS-88 Massey, J.L. "An Introduction to Contemporary Cryptology," Proceedings of the IEEE, May 1988, pp. 533-549.

Key Words: methods, theory, general.

MAT-86 Matyas, S.M. "Public Key Registration," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL- 87), pp. 451-458.

Key Words: methods, public- key.

MAT-88 Matsumoto, T., and H. Imai "Public Quadratic Polynomial-Tuples for Efficient Signature Verification and Message Encryption," Proc. Eurocrypt '88, Davos, 1988, (8: GUN- 89), pp. 419-453.

Key Words: methods, signatures.

MCC-88 McCurley, K.S. "A Key Distribution System Equivalent to Factoring," Journal of Cryptology, Vol. 1, No. 2, 1988, pp. 95-105.

Key Words: methods, keys, case.

MCE-81 McElicie, R.J., and D.V. Sarwate "On Sharing Secrets and Reed-Solomon Codes," Communications of the ACM, September 1981, pp. 583-584.

Key Words: theory, codes.

MEA-87 Meadows, C., and D. Mutchler "Matching Secrets in the Absence of a Continuously Available Trusted Authority," IEEE Trans. on Software Engr., February 1987, pp. 289-292.

Key Words: methods, protocols.

MEA-88 Meadows, C., "Some Threshold Schemes Without Central Key Distribution," Proc. Crypto '88, Santa Barbara, CA, 1988 (8: GOL-89b).

Key Words: methods, keys.

MEI-82 Meijer, H., and S. Akl "Digital Signature Schemes," Cryptologia, October 1982, pp. 329-338

Key Words: methods, signatures.

MEI-85 Meijer, H., and S. Akl "Two New Secret Key Cryptosystems," Proc. Eurocrypt '85, Linz, 1985, (8: PIC-86), pp. 96-102.

Key Words: methods, algorithms.

MEI-88 Meier, W., and O. Staffelbach "Fast Correlation Attacks on Stream Ciphers," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 301-314.

Key Words: analysis, methods.

MEI-89 Meier, W., and O. Staffelbach "Fast Correlation Attacks on Certain Stream Ciphers," Journal of Cryptology, Vol. 1, No. 3, 1989, pp. 159-176.

Key Words: analysis, methods.

MER-80 Merkle, R.C. "Protocols for Public Key Cryptosystems," Proc. 1980 IEEE Symp. Sec. & Privacy, (5: IEE-80), pp. 122-134.

Key Words: protocols, public-key.

MER-81 Merkle, R.C. "On the Security of Multiple Encryptions," Communications of the ACM, July 1981, pp. 465- 467.

Key Words: analysis, methods.

MER-82 Merritt, M. "Key Reconstruction," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 321-375.

Key Words: methods, keys, design.

MER-82a Merkle, R.C. Security, Authentication, and Public-Key Systems, University of Michigan Press, Ann Arbor, MI, 1982.

Key Words: book, public- key.

MER-87 Merkle, R.C. "A Digital Signature Based on a Conventional Encryption Function," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 369-378.

Key Words: methods, signatures.

MER-89 Merkle, R.C. "A Certified Digital Signature," Proc. Crypto '89, Santa Barbara, CA, 1989, (8: BRA-89).

Key Words: signatures, case.

MER-89a Merkle, R.C. "One Way Hash Functions and the DES," Proc. Crypto '89, Santa Barbara, CA, 1989, (8: BRA-89).

Key Words: DES, methods, design.

MEY-82 Meyer, C.H., and S.M. Matyas Cryptography - A New Dimension in Computer Data Security, J. Wiley & Sons, New York, 1982.

Key Words: book, general, theory, methods, keys.

MIC-86 Micali, S., et al. "The Notion of Security for Probabilistic Cryptosystems," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL- 87), pp. 381-392.

Key Words: methods, theory.

MIC-89 Micali, S. "Digital Signatures: The Evolution of a Fundamental Primitive," Proc. Crypto '89, Santa Barbara, CA, 1989, (8: BRA-89).

Key Words: signatures, theory.

MIL-85 Miller, V.S. "Use of Elliptic Curves in Cryptography," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 415- 426.

Key Words: methods, theory.

MOO-85 Moore, T.E., and S.E. Tavares "A Layered Approach to the Design of Private Key Cryptosystems," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 227- 245.

Key Words: methods, design, case.

MOO-86 Moore, J.H., and G.J. Simmons "Cycle Structures of the DES with Weak and Semiweak Keys," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 187-205.

Key Words: DES, analysis, design.

MOO-87 Moore, J.H., and G.J. Simmons "Cycle Structure of the DES for Keys Having Palindromic (or Anti-palindromic) Sequences of Keys," IEEE Trans. of Software Engr., February 1987, pp. 262-273.

Key Words: DES, analysis, design.

MOR-81 Morrison, D.R. "Subtractive Encryptors -- Alternatives to the DES," Proc. Crypto '81, Santa Barbara, CA, 1981, (8: GER- 82), pp. 42-52.

Key Words: DES, methods, case.

MUL-84 Mullin, A.A. "A Note on the Mathematics of Public-Key Cryptosystems," Computers & Security, February 1984, pp. 45-47.

Key Words: public-key, theory.

NIE-85 Niederreiter, H. "A Public-Key Cryptosystem Based on Shift Register Sequences," Proc. Eurocrypt '85, Linz, 1985, (8: PIC-86), pp. 35-39.

Key Words: methods, public- key.

OCO-87 O'Connor, L.J. and J. Seberry The Cryptographic Significance of the Knapsack Problem, Aegean Park Press, Laguna Hills, CA, 1987.

Key Words: book, knapsack, analysis, theory.

ODL-84 Odlyzko, A.M. "Cryptanalytic Attacks on the Multiplicative Knapsack Cryptosystem and on Shamir's Fast Signature System, IEEE Trans. on Inform. Theory, July 1984, pp. 594-601.

Key Words: analysis, knapsack, signatures.

ODL-84a Odlyzko, A.M. "Discrete Logarithms in Finite Fields and Their Cryptographic Significance," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 225- 314.

Key Words: methods, theory.

ODL-87 Odlyzko, A.M., (Ed.) Advances in Cryptology, Proceedings of Crypto '86, Santa Barbara, CA, August 1988, Lecture Notes in Computer Science No. 263, Springer-Verlag, New York, 1987.

Key Words: proceedings, general.

OKA-85 Okamoto, T., and A. Shiraishi "A Fast Signature Scheme Based on Quadratic Inequalities," Proc. 1985 IEEE Symp. Sec. & Privacy, 1985, (5: IEE-85), pp. 123- 133.

Key Words: methods, signatures.

OKA-85a Okamoto, E., and K. Nakamura "Lifetimes of Keys in Cryptographic Key Management Systems," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 246-259.

Key Words: keys, management.

OKA-86 Okamoto, E. "Proposal for Identity-Based Key Distribution Systems," Electronics Letters, Nov. 20, 1986, pp. 1283-1284.

Key Words: methods, keys.

OKA-87 Okamoto, E. "Key Distribution Systems Based on Identification Information," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 194- 202.

Key Words: keys, management.

OKA-88 Okamoto, E. "Substantial Number of Cryptographic Keys and Its Application to Encryption Design," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 361-373

Key Words: methods, keys, design.

OKA-88a Okamoto, T. "A Digital Multisignature Scheme Using Bijective PublicKey Cryptosystems," ACM Trans. on Computer Systems, November 1988, pp. 432-441.

Key Words: methods, signatures.

OKA-89 Okamoto, E., and K. Ohta "Disposable Zero-Knowledge Authentications and Their Application to Untraceable Electronic Cash," Proc. Crypto '89, Santa Barbara, CA, 1989 (8: BRA-89).

Key Words: methods, zero, design.

ONG-83 Ong, H., and C.P. Schorr "Signatures through Approximate Representations by Quadratic Forms," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA-84b), pp. 117-132.

Key Words: methods, signatures.

ONG-84 Ong, H., C. Schnorr, and A. Shamir "Efficient Signature Schemes Based on Polynomial Equations," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 37-46.

Key Words: methods, signatures.

PAT-87 Patterson, W. Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, Totowa, NJ, 1987.

Key Words: book, theory.

PFI-87 Pfitzmann and M. Waidner "Networks Without User Observability," Computers & Security, April 1987, pp. 158-166.

Key Words: methods, case.

PIC-86 Pichler, F. (Ed.) Advances in Cryptology: Proceedings of Eurocrypt '85, Linz, Austria, April 1985, Lecture Notes in Comp. Science, No. 219, Springer- Verlag, New York, 1986.

Key Words: proceedings, general.

PIE-84 Pieprzyk, J.P. "Algebraical Structures of Cryptographic Transformations," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 16-24.

Key Words: algorithms, theory.

PIE-85 Pieprzyk, J.P. "On Public-Key Cryptosystems Built Using Polynomial Rings," Proc. Eurocrypt '85, Linz, 1985, (8: PIC-86), pp. 73-78.

Key Words: methods, public- key.

PIE-85a Pieprzyk, J.P., D.A. Rutowski "Modular Design of Information Encipherment for Computer Systems," Computers & Security, September 1985, pp. 211- 218.

Key Words: methods, design.

PIE-85b Pieprzyk, J.P., D.A. Rutkowski "Design of Public Key Cryptosystems Using Idempotent Elements," Computers & Security, December 1985, pp. 297-308.

Key Words: design, public- key.

PIP-89 Piper, F., and M. Walker "Linear Ciphers and Spreads," Journal of Cryptology, Vol. 1, No. 3, 1989, pp. 185-188.

Key Words: methods, theory.

POE-85 Poet, R. "The Design of Special- Purpose Hardware to Factor Large Integers," Computer Physics Communications, 1985, pp. 337-341.

Key Words: analysis, hardware.

POM-83 Pomerance, C., et al., "New Ideas for Factoring Large Integers," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA-84b), pp. 81- 86.

Key Words: analysis, algorithms.

POM-85 Pomerance, C. "The Quadratic Sieve Factoring Algorithm," Proc. Eurocrypt '84, Paris, (8: BET-85), pp. 169-182.

Key Words: analysis, algorithms.

POM-88 Pomerance, C., (Ed.) Advances in Cryptology: Proceedings of Crypto '87, Santa Barbara, CA, August 1988, Lecture Notes in Computer Science No. 293, Springer, New York, 1988.

Key Words: proceedings, general.

POR-84 Porter, S. "Cryptology and Number Sequences: Pseudorandom, Random, and Perfectly Random," Computers & Security, February 1984, pp. 43-44.

Key Words: algorithms, theory.

PRE-89 Preneel, B., et al. "A Chosen Text Attack on the Modified Cryptographic Checksum Algorithm of Cohen and Huang," Proc. Crypto '89, Santa Barbara, CA, 1989, (8: BRA-89).

Key Words: analysis, checksum.

PRO-84 Proctor, N. "A Self-Synchronizing Cascaded Cipher System with Dynamic Control of Error Propagation," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 174- 190.

Key Words: methods, design.

QUI-85 Quisquater, J.-J., Y. Desmedt, and M. Davio "The Importance of `Good' Key Scheduling Schemes (How to Make a Secure DES Scheme with <48-Bit Keys>?)," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 537-542.

Key Words: DES, methods, design.

QUI-87 Quisquater, J.-J. "Secret Distribution of Keys for Public-Key Systems," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM- 88), pp. 203-208.

Key Words: public-key, keys.

QUI-89 Quisquater, J., and J. Delescaille "How Easy Is Collision Search? New Results and Applications to DES," Proc. Crypto '89, Santa Barbara, CA, 1989 (8: BRA-89).

Key Words: DES, methods, design.

QUI-89a Quisquater, J.-J., and K.Vedder "A Signature with Shared Verification Scheme," Proc. Crypto '89, Santa Barbara, CA, 1989 (8: BRA-89).

Key Words: verification, signature.

QUI-89b Quisquater, J.-J., (Ed.) Advances in Cryptology: Proceedings of Eurocrypt- 89, Houthalen, Belgium, April 10-13, 1989, Lecture Notes in Computer Science, Springer-Verlag, New York, 1989.

Key Words: proceedings, gneral.

RAO-84 Rao, T.R.N. "Joint Encryption and Error Correction Schemes," Proc., 11th Intern. Symp. on Comp. Arch., May 1984.

Key Words: methods, codes.

RAO-86 Rao, T.R.N., and K.-H. Nam "Private-Key Algebraic-Coded Cryptosystems," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 35- 48.

Key Words: methods, codes.

RAO-87 Rao, T.R.N. "On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 458-461.

Key Words: analysis, methods, case.

RAO-89 Rao, T.R.N., and K.H. Nam "Private-Key Algebraic-Code Encryptions," IEEE Trans. on Inform. Theory, July 1989, pp. 829-833.

Key Words: methods, codes.

REE-84 Reeds, J.A., and J. Manferdelli "DES Has No Per Round Linear Factors," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 377- 389

Key Words: DES, analysis, design.

RIT-81 Ritts, R.R. "Data Encryption Basics and the Cipher Feedback Method," Telecommunications, June 1981, pp. 39-44.

Key Words: methods, theory.

RIV-82 Rivest, R.L., and A.T. Sherman "Randomized Encryption Technique," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA-83b), pp. 145-163.

Key Words: methods, design, random.

RIV-84 Rivest, R.L., and A. Shamir "How to Expose an Eavesdropper," Communications of the ACM, April 1984, pp. 393- 395.

Key Words: analysis, threat, methods.

RUB-81 Rubin, F. "Decrypting a Stream Cipher Based on J-K Flip-Flops," Cryptologia, January 1981, pp. 51-57.

Key Words: analysis, methods.

RUB-87 Rubin, F. "Foiling an Exhaustive Key- Search Attack," Cryptologia, April 1987, pp. 102-107

Key Words: analysis, methods.

RUE-86 Rueppel, R. Analysis and Design of Stream Ciphers, Springer Verlag, New York, 1986.

Key Words: book, analysis, design.

RUE-88 Rueppel, R. "Key Agreements Based on Function Composition," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 3-10.

Key Words: methods, keys.

RUG-84 Ruggiu, G. "Cryptology and Complexity Theories," Proc. Eurocrypt '84, Paris, 1984, (8: BET- 85), pp. 3-9.

Key Words: methods, complexity.

SAL-88 Salomaa, A. "A Public-Key Cryptosystem Based on Language Theory," Computers & Security, February 1988, pp. 83-87.

Key Words: methods, theory.

SCH-84 Schnorr, C.P., and W. Alexi "RSA-bits are 0.5 + e Secure," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 113-126.

Key Words: RSA, analysis, theory.

SEB-89 Seberry, J., and J. Pieprzyk Cryptography: An Introduction to Computer Security, Prentice-Hall, New York, 1989

Key Words: book, general.

SGA-83 Sgarro, A. "Error Probabilities for Simple Substitution Ciphers," IEEE Trans. on Inform. Theory, 1983, pp. 190-198.

Key Words: methods, analysis, theory.

SGA-84 Sgarro,A. "Equivocations for Homophonic Ciphers," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 51-61.

Key Words: methods, theory.

SHA-80 Shamir, A. "The Cryptographic Security of Compact Knapsacks," Proc. 1980 IEEE Symp. Sec. & Privacy, (5: IEE-80), pp. 94-98

Key Words: analysis, knapsack.

SHA-80 Shamir, A.,,and R.E. Zippel "On the Security of the Merkle-Hellman Cryptographic Systems," IEEE Trans. on Inform. Theory, May 1980, pp. 339- 340.

Key Words: analysis, knapsack.

SHA-81 Shamir, A., R.L. Rivest, and L. Adleman "Mental Poker," in Klarner, D.E. (Ed.), Mathematical Gardner, Wadsworth, NY, 1981, pp. 37-43.

Key Words: methods, protocols.

SHA-83 Shamir, A. "On Generation of Computationally Strong Pseudo-Random Sequences," ACM Trans. on Computer Systems, May 1983, pp. 38- 44.

Key Words: algorithms, random.

SHA-84 Shamir, A. "A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem," IEEE Trans. of Inform. Theory, September 1984, pp. 525-530.

Key Words: analysis, algorithm, knapsack.

SHA-84a Shamir, A. "Identity-Based Cryptosystems and Signature Schemes," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 45-53.

Key Words: methods, signatures.

SIE-84 Siegenthaler, T. "Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications," IEEE Trans. of Inform. Theory, September 1984, pp. 776-780.

Key Words: algorithms, theory.

SIE-85 Siegenthaler, T. "Decrypting a Class of Sream Ciphers Using Ciphertext Only," IEEE Trans. on Computers, January 1985, pp. 81-85.

Key Words: analysis, methods.

SIM-80 Simmons, G.J. "Secure Communications in the Presence of Pervasive Deceit," Proc. 1980 IEEE Symp. Sec. & Privacy, (5: IEE-80), pp. 84-93.

Key Words: therats, methods.

SIM-81 Simmons, G.J. "A System for Point-of-Sale or Access, User Authntication and Identification," Proc. Crypto '81, Santa Barbara, CA, 1981, (8: GER-82), pp. 31-37.

Key Words: authentication.

SIM-81a Simmons, G.J. "Half a Loaf Is Better than None: Some Novel Message Integrity Problems," Proc. 1981 IEEE Symp. Sec. & Privacy, (5: IEE-81), pp. 65- 69.

Key Words: authentication.

SIM-82 Simmons, G.J., and D. Holdridge "Forward Search as a Cryptanalytic Tool Against Public Key Privacy Channel," Proc. 1982 IEEE Symp. Sec. & Privacy, (5: IEE-82), pp. 117-128.

Key Words:analysis, public- key.

SIM-82a Simmons, G.J. "A Game Theory Model of Digital Message Authentication," Congressus Numerantium, 1982, pp. 413- 424.

Key Words: authentication, models.

SIM-83 Simmons, G.J. "The Prisoners' Problem and the Subliminal Channel," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA- 84b), pp. 51-67.

Key Words: analysis, methods.

SIM-83a Simmons, G.J. "Verification of Treaty Compliance Revisited," Proc. 1983 IEEE Symp. Sec. & Privacy, (5: IEE-83a), pp. 61- 66.

Key Words: verification, methods.

SIM-84 Simmons, G.J. "Authentication Theory/Coding Theory," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 411-431.

Key Words: authentication, codes, theory.

SIM-84a Simmons, G.J. "The Subliminal Channel and Digital Signatures," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 364-378.

Key Words: theory, signaturtes

SIM-84b Simmons, G.J. "Message Authentication: A Game on Hypergraphs," Congressus Numerantium, 1984, pp. 161-192.

Key Words: models, authentication.

SIM-85 Simmons, G.J. "A Secure Subliminal Channel (?)" Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 33- 41.

Key Words: methods, theory.

SIM-85a Simmons, G.J. "How to (Selectively) Broadcast a Secret," Proc. 1985 IEEE Symp. Sec. & Privacy, (5: IEE-85), pp. 108-113.

Key Words: methods, protocols.

SIM-86 Simmons, G.J. "Cryptology," Encyclopedia Britannica, Encyclopaedia Britannica, Inc., Chigaco, IL, 1986, pp. 913-924B.

Key Words: methods, general.

SIM-87 Simmons, G.J. "An Impersonation-Proof Identity Verification Scheme," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 211-215.

Key Words: authentication, case.

SIM-87a Simmons, G.J. "A Natural Taxonomy for Digital Information Authentication Schemes," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM- 88), pp. 269-288

Key Words: authentication, theory.

SIM-88 Simmons, G.J. "Authentication Codes that Permit Arbitration," Congressus Numerantium, March 1988, pp. 275-290.

Key Words: authentication, codes.

SIM-88a Simmons, G.J. "How to (Really) Share a Secret," Proc. Crypto '88, Santa Barbara, CA, 1988 (8: GOL-89b).

Key Words: methods, protocols.

SIM-88b Simmons, G.J., and G.B. Purdy "Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 35.

Key Words: protocols, zero.

SIM-89 Simmons, G.J. "Prepositioned Shared Secret and/or Shared Control Schemes," Proc. Eurocrypt '89, Houthalen, 1989, (8: QUI-89).

Key Words: methods, protocols.

SIM-89a Simmons, G.J. "A Protocol to Provide Verifiable Proof of Identity and Unforgeable Transaction Receipts," IEEE J. Selected Areas in Comm., May 1989, pp. 435-447.

Key Words: methods, protocols.

SLO-82 Sloane, N.J.A. "Error-Correcting Codes and Cryptology, Part 1," Cryptologia, April 1982, pp. 128-153.

Key Words: methods, codes.

SLO-82a Sloane, N.J.A. "Error-Correcting Codes and Cryptology, Part 2," Cryptologia, July 1982, pp. 258-278.

Key Words: methods, codes.

SME-84 Smeets, B.J.M. "On the Use of the Binary Multiplying Channel in a Private Communication Channel," Proc. Eurocrypt '84, Paris, 1984, (8: BET- 85), 339-348.

Key Words: methods, design.

SME-85 Smeets, B. "A Comment on Niedereiter's Public-Key Cryptosystem," Proc. Eurocrypt '85, Linz, 1985, (8: PIC-86), pp. 40-42.

Key Words: analysis, public- key.

SPE-83 Spencer, M.E., and S.E. Tavares "A Layered Broadcast Cryptographic System," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA-84b), pp. 157-170.

Key Words: methods, case.

STI-87 Stinson, D.R., and S.A. Vanstone "A Combinatorial Approach to Threshold Schemes," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 330-339.

Key Words: methods, keys.

STI-87a Stinson, D.R. "A Construction of Authentication/Secrecy Codes from Certain Combinatorial Designs," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 255-366.

Key Words: authentication, codes, design, case.

STI-88 Stinson, D.R. "Some Constructions and Bounds for Authentication Codes," Journal of Cryptology, Vol. 1, No. 1, 1988, pp. 37-64.

Key Words: authentication, theory design, codes.

STI-88a Stinson, D.R. "A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs," Journal of Cryptology, Vol. 1, No. 2, 1988, pp. 119-127.

Key Words: authentication, codes, design, theory.

STR-87 Struik, R. , and J. van Tilburg "The Rao-Nam Scheme in Insecure Against a Chosen Plaintext Attack," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 445-457.

Key Words: analysis, case.

TAN-87 Tanaka, H. "A Realization Scheme for the Identity-Based Cryptosystem," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 340- 349.

Key Words: methods, design.

TED-84 Tedrick, T. "Fair Exchange of Secrets," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA- 84a), pp. 434-438.

Key Words: methods, protocols.

TOM-86 Tompa, M., and H. Woll "How to Share a Secret With Cheaters," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 261-265.

Key Words: methods, protocols.

TSU-89 Tsujii, S., and T. Itoh "An ID-Based Cryptosystem Based on Discrete Logarithm Problem," IEEE Journal on Selected Areas in Communications, May 1989, pp. 467-473.

Key Words: methods, case.

VAL-88 Vallee, B., et al. "How to Break Okamoto's Cryptosystem by Reducing Lattice Bases," Proc. Eurocrypt '88, Davos, 1988, (8: GUN-89), pp. 281-291.

Key Words: analysis, methods.

VAN-85 van Tilborg, J., and D.E. Boekee "Divergence Bounds on Key Encryption and Error Probability in Cryptanalysis," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL- 86), pp. 489-513.

Key Words: methods, keys, theory.

VAN-87 van de Graaf, J., and R. Peralta "A Simple and Secure Way to Show the Validity of Your Public Key," Proc. Crypto '87, Santa Barbara, CA, 1987, (8: POM-88), pp. 128- 134.

Key Words: methods, public- key.

VAN-88 van Tilborg, J. An Introduction to Cryptology, Kluwer Academic Publishers, Norwell, MA, 1988.

Key Words: book, general.

VAR-85 Varadharajan, V. "Extension of RSA Cryptosystems to Matrix Rings," Cryptologia, April 1985, pp. 140-153.

Key Words: RSA, theory, case.

VAR-85a Varadharajan, V. "Trapdoor Rings and Their Use in Cryptography," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 369-395.

Key Words: methods, theory.

WAG-84 Wagner, N.R. "A Public-Key Cryptosystem Based on the Word Problem," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 19-36.

Key Words: methods, case.

WAG-84a Wagner, N. "Search for Public-Key Cryptosystems," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 91- 98.

Key Words: methods, public- key.

WAG-85 Wagner, N.R., P.S. Putter, and M.R. Cain "Using Algorithms as Keys in Stream Ciphers," Proc. Eurocrypt '85, Linz, 1985, (8: PIC-86), pp. 149-155.

Key Words: methods, keys.

WAG-86 Wagner, N. "Large-Scale Randomization Techniques," Proc. Crypto '86, Santa Barbara, CA, 1986, (8: ODL-87), pp. 393- 404.

Key Words: methods, random.

WEB-85 Webster, A.F., and S.E. Tavares "On the Design of S-Boxes," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL- 86), pp. 523-534.

Key Words: DES, analysis, design.

WEI-83 Weingarten, F.W. "Controlling Cryptographic Publication," Computers & Security, Jan. 1983, pp. 41- 48.

Key Words: policy, research.

WIL-80 Williams, H.C. "A Modification of the RSA Public-Key Cryptosystem," IEEE Trans. on Inform. Theory, November 1980, pp. 726-729.

Key Words: RSA, methods, design.

WIL-82 Willett, M. "A Tutorial on Public Key Cryptosystems," Computer & Security, January 1982, pp. 72-79.

Key Words: methods, public- key.

WIL-84 Williams, H.C. "Some Public-Key Crypto- Functions As Intractable as Factorization," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 66- 70.

Key Words: methods, public- key.

WIL-85 Williams, H.C. "An M3 Public-Key Encryption Scheme," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 358-368.

Key Words: methods, public- key.

WIL-86 Williams, H. (Ed.) Advances in Cryptology, Proceedings of Crypto '85, Santa Barbara, CA, August 1985, Lecture Notes in Computer Science, No. 218, Springer-Verlag, New York, 1986

Key Words: proceedings, general.

WIN-82 Winternitz, R.S. "Security of a Keystream with Secret Initial Value," Proc. Crypto '82, Santa Barbara, CA, 1982, (8: CHA- 83b), pp. 133-137.

Key Words: analysis, methods.

WIN-83 Winternitz, R.S. "Producing a One-Way Hash Function from DES," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA-84b), pp. 203-207.

Key Words: DES, methods, design.

WIN-84 Winternitz, R.S. "A Secure One-Way Hash Function Built from DES," Proc. 1984 IEEE Symp. Sec., (5: IEE-84), pp. 121-126.

Key Words: DES, methods, design.

WIN-87 Winternitz, R., and M. Hellman "Chosen-Key Attacks on a Block Cipher," Cryptologia, January 1987, pp. 16-20.

Key Words: analysis, methods.

WOL-85 Wolfram, S. "Cryptography with Cellular Automata," Proc. Crypto '85, Santa Barbara, CA, 1985, (8: WIL-86), pp. 429-432.

Key Words: methods, case.

WUN-83 Wunderlich, M.C. "Factoring Numbers on the Massively Parallel Computer," Proc. Crypto '83, Santa Barbara, CA, 1983, (8: CHA-84b), pp. 87-102.

Key Words: analysis, methods, hardware.

WUN-83a Wunderlich, M.C. "Recent Advances in the Design and Implementation of Large Integer Factorization Algorithms," Proc. 1983 IEEE Symp. Sec. & Privacy, (5: IEE-83a), pp. 67-71.

Key Words: analysis, algorithms.

YAC-89 Yacobi, Y., and Z. Shmuley "On Key Distribution Systems," Proc. Crypto '89, Santa Barbara, CA, 1989 (8: BRA-89).

Key Words: methods, keys.

YAG-85 Yagisawa, M. "A New Method for Realizing Public-Key Cryptosystems," Cryptologia, October 1985, pp. 360-371.

Key Words: methods, public- key.

YAM-86 Yamamoto, H. "On Secret Sharing Communication Systems with Two or Three Channels," IEEE Trans. Inform. Theory, May 1986.

Key Words: methods, protocols.

YAO-82 Yao, A.C. "Theory and Applications of Trapdoor Functions," Proc., 23d IEEE Symposium on Foundations of Comp. Science, November 1982, pp. 80-91.

Key Words: methods, theory. YAO-82a Yao, A.C. "Protocol for Secure Computation," Proc., 23d IEEE Symposium on Foundations of Computer Science, November 1982, pp. 160-164.

Key Words: methods, protocols.

YAO-86 Yao, A.C. "How to Generate and Exchange Secrets," Proc., 27th IEEE Symposium on Foundations of Computer Science, October 1986, pp. 162-167.

Key Words: methods, protocols.

YUK-89 Yu, K.W., and T.L. Yu "Data Encryption Based on Time Reversal Algorithms," The Computer Journal, (U.K.), June 1989, pp. 241- 245.

Key Words: methods, algorithms. YUN-84 Yung, M. "Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game," Proc. Crypto '84, Santa Barbara, CA, 1984, (8: BLA-84a), pp. 439-453.

Key Words: methods, protocols.

Zheng, Y., T. Matsumoto, and H. Imai "On the Construction of Block Ciphers and Not Relying on Any Unproved Hypotheses," Proc. Crypto '89, Santa Barbara, CA, 1989 (8: BRA-89).

Key Words: methods, design.

Zorbette, G. "Breaking the Enemy's Code," IEEE Spectrum, September 1987, pp. 47-51.

Key Words: analysis, methods.

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
What do you call the main box of the computer?
Comp keeps freezing after bootup :(
Essential Programs Thread
Your tech related job
32-bit OS on 64-bit computer
Split Hard Drive???
computer crashed
Intel's Q6600
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS