What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All service
Peer review service
Papers from CRYPTO 1985
Year
Venue
Title
1985
CRYPTO
A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes
Yvo Desmedt
Andrew M. Odlyzko
1985
CRYPTO
A Framework for the Study of Cryptographic Protocols
Richard Berger
Sampath Kannan
René Peralta
1985
CRYPTO
A Layered Approach to the Design of Private Key Cryptosystems
T. E. Moore
Stafford E. Tavares
1985
CRYPTO
A Secure Poker Protocol that Minimizes the Effect of Player Coalitions
Claude Crépeau
1985
CRYPTO
A Secure Subliminal Channel (?)
Gustavus J. Simmons
1985
CRYPTO
Access Control at the Netherlands Postal and Telecommunications Services
Willem H. Haemers
1985
CRYPTO
An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi
Ernest F. Brickell
John M. DeLaurentis
1985
CRYPTO
An M³ Public-Key Encryption Scheme
Hugh C. Williams
1985
CRYPTO
Analysis of a Public Key Approach Based on Polynomial Substitution
Harriet J. Fell
Whitfield Diffie
1985
CRYPTO
Another Birthday Attack
Don Coppersmith
1985
CRYPTO
Attacks on Some RSA Signatures
Wiebren de Jonge
David Chaum
1985
CRYPTO
Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields
Dennis Estes
Leonard M. Adleman
Kireeti Kompella
Kevin S. McCurley
Gary L. Miller
1985
CRYPTO
Cheating at Mental Poker
Don Coppersmith
1985
CRYPTO
Correlation Immunity and the Summation Generator
Rainer A. Rueppel
1985
CRYPTO
Cryptography with Cellular Automata
Stephen Wolfram
1985
CRYPTO
Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers
David Chaum
Jan-Hendrik Evertse
1985
CRYPTO
Design of Combiners to Prevent Divide and Conquer Attacks
Thomas Siegenthaler
1985
CRYPTO
Developing an RSA Chip
Martin Kochanski
1985
CRYPTO
Divergence Bounds on Key Equivocation and Error Probability in Cryptanalysis
Johan van Tilburg
Dick E. Boekee
1985
CRYPTO
Efficient Parallel Pseudo-Random Number Generation
John H. Reif
J. D. Tygar
1985
CRYPTO
Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone Without Having to Trust Him?
Joan Feigenbaum
1985
CRYPTO
Fingerprinting Long Forgiving Messages
G. R. Blakley
Catherine Meadows
George B. Purdy
1985
CRYPTO
How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract)
Michael Luby
Charles Rackoff
1985
CRYPTO
How to Reduce Your Enemy's Information (Extended Abstract)
Charles H. Bennett
Gilles Brassard
Jean-Marc Robert
1985
CRYPTO
Information Theory Without the Finiteness Assumption, II: Unfolding the DES
G. R. Blakley
1985
CRYPTO
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES)
Burton S. Kaliski Jr.
Ronald L. Rivest
Alan T. Sherman
1985
CRYPTO
Lenstra's Factorization Method Based on Elliptic Curves
N. M. Stephens
1985
CRYPTO
Lifetimes of Keys in Cryptographic Key Management Systems
Eiji Okamoto
K. Nakamura
1985
CRYPTO
On Computing Logarithms Over Finite Fields
Taher El Gamal
1985
CRYPTO
On the Design of S-Boxes
A. F. Webster
Stafford E. Tavares
1985
CRYPTO
On the Security of DES
Adi Shamir
1985
CRYPTO
On the Security of Ping-Pong Protocols when Implemented using the RSA
Shimon Even
Oded Goldreich
Adi Shamir
1985
CRYPTO
On Using RSA with Low Exponent in a Public Key Network
Johan Håstad
1985
CRYPTO
Public Protection of Software
Amir Herzberg
Shlomit S. Pinter
1985
CRYPTO
Security for the DoD Transmission Control Protocol
Whitfield Diffie
1985
CRYPTO
Software Protection: Myth or Reality?
James R. Gosler
1985
CRYPTO
Some Cryptographic Aspects of Womcodes
Philippe Godlewski
Gérard D. Cohen
1985
CRYPTO
Symmetric Public-Key Encryption
Zvi Galil
Stuart Haber
Moti Yung
1985
CRYPTO
The Bit Security of Modular Squaring Given Partial Factorization of the Modulos
Benny Chor
Oded Goldreich
Shafi Goldwasser
1985
CRYPTO
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys)
Jean-Jacques Quisquater
Yvo Desmedt
Marc Davio
1985
CRYPTO
The Real Reason for Rivest's Phenomenon
Don Coppersmith
1985
CRYPTO
Trapdoor Rings and Their Use in Cryptography
Vijay Varadharajan
1985
CRYPTO
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences
Yvo Desmedt
1985
CRYPTO
Use of Elliptic Curves in Cryptography
Victor S. Miller