EUROCRYPT A*

33 papers

YearTitle / Authors
1986Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings
Franz Pichler
1985A Comment on Niederreiter's Public Key Cryptosystem.
Bernhard Smeets
1985A Note On Sequences Generated by Clock Controlled Shift Registers.
Bernhard Smeets
1985A Public-Key Cryptosystem based on Shift Register Sequences.
Harald Niederreiter
1985Analysis of a Nonlinear Feedforward Logic for Binary Sequence Generators.
J. Bernasconi, Christoph G. Günther
1985Authorized Writing for "Write-Once" Memories.
Philippe Godlewski, Gérard D. Cohen
1985Cryptanalysis of the Dickson Scheme.
Winfried B. Müller, Rupert Nöbauer
1985Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences.
Thomas Siegenthaler
1985Efficient Factoring Based on Partial Information.
Ronald L. Rivest, Adi Shamir
1985Encryption: Needs, Requirements, and SOlutions in Banking Networks.
U. Rimensberger
1985Engineering Secure Information Systems.
Donald W. Davies, Wyn L. Price
1985Full Encryption in a Personal Computer System.
Robert L. Bradey, Ian G. Graham
1985Generalized Multiplexed Sequences.
Mulan Liu, Zhe-Xian Wan
1985Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System.
Joos Vandewalle, René Govaerts, W. De Becker, Marc Decroos, G. Speybrouck
1985Is the Data Encryption Standard a Group? (Preliminary Abstract).
Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman
1985Linear Complexity and Random Sequences.
Rainer A. Rueppel
1985Message Protection by Spread Spectrum Modulation in a Packet Voice Radio Link.
Max Kowatsch, Bernd O. Eichinger, Franz J. Seifert
1985Modelling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks.
Gordon B. Agnew
1985Networks Without User Observability: Design Options.
Andreas Pfitzmann, Michael Waidner
1985On Feedforward Transforms and p-Fold Periodic p-Arrays.
Dong-sheng Chen, Zong-Duo Dai
1985On Functions of Linear Shift Register Sequences.
Tore Herlestam
1985On Public-Key Cryptosystems Built using Polynomial Rings.
Josef Pieprzyk
1985On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic Research.
Tom Tedrick
1985On the Linear Complexity of Combined Shift Register Sequences.
Lennart Brynielsson
1985Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms.
David Chaum
1985Simultaneous Security of Bits in the Discrete Log.
René Peralta
1985The Chipcard: An Identification Card With Cryptographic Protection.
Thomas Krivachy
1985The Contribution of E. B. Fleissner and A. Figl for Today's Cryptography.
Otto J. Horak
1985The Practice of Authentication.
Gustavus J. Simmons
1985The Role of Encipherment Services in Distributed Systems.
R. W. Jones, M. S. J. Baxter
1985The Verifiability of Two-Party Protocols.
Ronald V. Book, Friedrich Otto
1985Two New Secret Key Cryptosystems.
Henk Meijer, Selim G. Akl
1985Using Algorithms as Keys in Stream Ciphers.
Neal R. Wagner, Paul Putter, Marianne R. Cain