default search action
EUROCRYPT 1985: Linz, Austria
- Franz Pichler:
Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings. Lecture Notes in Computer Science 219, Springer 1986, ISBN 3-540-16468-5
History of Cryptography
- Otto J. Horak:
The Contribution of E. B. Fleissner and A. Figl for Today's Cryptography. 3-17 - Tom Tedrick:
On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic Research. 18-28
Public Key Cryptography
- Ronald L. Rivest, Adi Shamir:
Efficient Factoring Based on Partial Information. 31-34 - Harald Niederreiter:
A Public-Key Cryptosystem based on Shift Register Sequences. 35-39 - Bernhard Smeets:
A Comment on Niederreiter's Public Key Cryptosystem. 40-42 - Joos Vandewalle, René Govaerts, W. De Becker, Marc Decroos, G. Speybrouck:
Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System. 43-49 - Winfried B. Müller, Rupert Nöbauer:
Cryptanalysis of the Dickson Scheme. 50-61 - René Peralta:
Simultaneous Security of Bits in the Discrete Log. 62-72 - Josef Pieprzyk:
On Public-Key Cryptosystems Built using Polynomial Rings. 73-78
Secret Key Cryptography
- Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman:
Is the Data Encryption Standard a Group? (Preliminary Abstract). 81-95 - Henk Meijer, Selim G. Akl:
Two New Secret Key Cryptosystems. 96-102 - Thomas Siegenthaler:
Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences. 103-110 - Philippe Godlewski, Gérard D. Cohen:
Authorized Writing for "Write-Once" Memories. 111-115
Shiftregister Sequences and Related Topics
- Tore Herlestam:
On Functions of Linear Shift Register Sequences. 119-129 - Dong-sheng Chen, Zong-Duo Dai:
On Feedforward Transforms and p-Fold Periodic p-Arrays. 130-134 - Mulan Liu, Zhe-xian Wan:
Generalized Multiplexed Sequences. 135-141 - Bernhard Smeets:
A Note On Sequences Generated by Clock Controlled Shift Registers. 142-148 - Neal R. Wagner, Paul Putter, Marianne R. Cain:
Using Algorithms as Keys in Stream Ciphers. 149-155 - Lennart Brynielsson:
On the Linear Complexity of Combined Shift Register Sequences. 156-160 - J. Bernasconi, Christoph G. Günther:
Analysis of a Nonlinear Feedforward Logic for Binary Sequence Generators. 161-166 - Rainer A. Rueppel:
Linear Complexity and Random Sequences. 167-188
Cryptographic Systems and Applications
- Donald W. Davies, Wyn L. Price:
Engineering Secure Information Systems. 191-199 - Thomas Krivachy:
The Chipcard: An Identification Card With Cryptographic Protection. 200-207 - U. Rimensberger:
Encryption: Needs, Requirements, and SOlutions in Banking Networks. 208-213 - R. W. Jones, M. S. J. Baxter:
The Role of Encipherment Services in Distributed Systems. 214-220 - Gordon B. Agnew:
Modelling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks. 221-230 - Robert L. Bradey, Ian G. Graham:
Full Encryption in a Personal Computer System. 231-240 - David Chaum:
Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms. 241-244 - Andreas Pfitzmann, Michael Waidner:
Networks Without User Observability: Design Options. 245-253 - Ronald V. Book, Friedrich Otto:
The Verifiability of Two-Party Protocols. 254-260 - Gustavus J. Simmons:
The Practice of Authentication. 261-272 - Max Kowatsch, Bernd O. Eichinger, Franz J. Seifert:
Message Protection by Spread Spectrum Modulation in a Packet Voice Radio Link. 273-277
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.