EUROCRYPT A*

37 papers

YearTitle / Authors
1985Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings
Thomas Beth, Norbert Cot, Ingemar Ingemarsson
1984A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques.
Ingrid Schaumüller-Bichl, Ernst Piller
1984A New Trapdoor Knapsack Public-Key Cryptosystem.
R. M. F. Goodman, Anthony J. McAuley
1984A Provably Secure Oblivious Transfer Protocol.
Richard Berger, René Peralta, Tom Tedrick
1984Algebraical Structures of Cryptographic Transformations.
Josef Pieprzyk
1984An Encryption and Authentication Procedure for Telesurveillance Systems.
Odoardo Brugia, Salvatore Improta, William Wolfowicz
1984An Optimal Class of Symmetric Key Generation Systems.
Rolf Blom
1984Bull CP8 Smart Card Uses in Cryptology.
Yves Giradot
1984Cryptology and Complexity Theories.
G. Ruggiu
1984Discrete Logarithms in Finite Fields and Their Cryptographic Significance.
Andrew M. Odlyzko
1984Encryption and Key Manaagement for the ECS Satellite Service.
Stephen C. Serpell, C. B. Brookson
1984Equivolcations for Homophonic Ciphers.
Andrea Sgarro
1984Estimation of Some Encryption Functions Implemented into Smart Cards.
H. Groscot
1984Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme.
Philippe Delsarte, Yvo Desmedt, Andrew M. Odlyzko, Philippe Piret
1984Linear Ciphers and Random Sequence Generators with Multiple Clocks.
James L. Massey, Rainer A. Rueppel
1984Non-Linear Non-Commutative Functions for Data Integrity.
Sami Harari
1984On Concurrent Identification Protocols.
Oded Goldreich
1984On Cryptosystems Based on Polynomials and Finite Fields.
Rudolf Lidl
1984On the Linear Complexity of Cascaded Sequences.
Rainer Vogel
1984On the Number of Close-and-Equal Pairs of Bits in a String.
Oded Goldreich
1984On the Use of the Binary Multiplying Channel in a Private Communication System.
Ben J. M. Smeets
1984Propagation Characteristics of the DES.
Marc Davio, Yvo Desmedt, Jean-Jacques Quisquater
1984Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers.
Dieter Gollmann
1984RSA Chips (Past/Present/Future).
Ronald L. Rivest
1984RSA-Bits are 0.5 + epsilon Secure.
Claus-Peter Schnorr, Werner Alexi
1984Secrecy and Privacy in a Local Area Network Environment.
Gordon B. Agnew
1984Security of Transportable Computerized Files.
André Bouckaert
1984Smart Card Applications in Security and Data Protection.
Jean Goutay
1984Smart Cards and Conditional Access.
Louis C. Guillou
1984Status Report on Factoring (At the Sandia National Laboratories).
James A. Davis, Diane B. Holdridge, Gustavus J. Simmons
1984Strong Primes are Easy to Find.
John Gordon
1984The Quadratic Sieve Factoring Algorithm.
Carl Pomerance
1984The Stop-and-Go Generator.
Thomas Beth, Fred Piper
1984The Subliminal Channel and Digital Signature.
Gustavus J. Simmons
1984Time-division Multiplexing Scramblers: Selecting Permutations and Testing the Systems.
A. Ecker
1984User Functions for the Generation and Distribution of Encipherment Keys.
R. W. Jones
1984Wire-Tap Channel II.
Lawrence H. Ozarow, Aaron D. Wyner