EUROCRYPT A*

35 papers

YearTitle / Authors
1986A Cryptanalytic Attack on the CADE Cryptosystem.
N. S. James, Rudolf Lidl, Harald Niederreiter
1986A Simple an Fast Probabilistic Algorithm for Computing Square Roots Modulo a Prime Number.
René Peralta, Jeroen van de Graaf
1986Activities of IFIP Working Group 11: 4 on Crypto Management.
Viiveke Fåk
1986Additional Properties in the S-Boxes of the DES.
Henri Cloetens, Yvo Desmedt, Luc Bierens, Joos Vandewalle, René Govaerts
1986Analyzing Encryption Protocols Using Formal Verification Techniques.
Richard A. Kemmerer
1986Another Look at Redundancy in Cryptographic Systems.
Gordon B. Agnew
1986Controlling Individual Information in Statistics by Coding.
Ove Frank, Per Weidenman
1986Correlation-Immune Polynomials over Finite Fields.
Thomas Siegenthaler
1986Could the Smart Card Be Dumb.
A. S. Glass
1986Cryptanalysis of Pseudo-Random Number Sequences Generated by a Linear Recurrence of a Given Order.
Anne Bauval
1986Cryptanalysis of the Yagisawa Public Key Cryptosystem.
Ernest F. Brickell
1986Cycle Structure of the Weak and Semi-Weak DES Keys.
Judy H. Moore, Gustavus J. Simmons
1986EUROCRYPT 1986, A Workshop on the Theory and Application of Cryptographic Techniques, Linköping, Sweden, 20-22 May 1986, Paper Abstracts
Ingemar Ingemarsson
1986Elementary Proof of Rueppel's Linear Complexity Conjecture.
Nguyen Quang A
1986Encryption Exponent 3 and the Security of RSA.
David S. P. Khoo, Gregory J. Bird, Jennifer Seberry
1986Geometric Structures as Threshold Schemes.
Albrecht Beutelspacher
1986Linear Complexity of Sequences with Period p
Dieter Gollmann
1986Multilevel Cryptosecure Relational Database.
George I. Davida, Yi-Shiung Yeh
1986On Commutative Semigroups of Polynomials and their Application in Cryptography.
Winfried B. Müller, Rupert Nöbauer
1986On Linear Shift Registers with Permuted Feedback.
Tore Herlestam
1986On Some Properties of the Sum of Two Pseudorandom Sequences.
Christoph G. Günther
1986On the Walsh-Fourier Analysis of Correlation-Immune Switching Functions.
Franz Pichler
1986Perfect Authentication Systems for Data Sources with Arbitrary Statistics.
Paul Schöbi
1986Products of Linear Recurring Sequence with Maximum Complexity.
Rainer A. Rueppel, Othmar Staffelbach
1986Properties of De Bruijn Sequences Generated by a Cross-Join Technique.
Maurice Beale
1986Protection Against Active Eavesdropping.
Cees J. A. Jansen
1986Public Key Encryption of Stream Ciphers.
D. D. Buckley, Maurice Beale
1986Several Exhaustive Key Search Machines and DES.
Yvo Desmedt, Frank Hoornaert, Jean-Jacques Quisquater
1986Sharma-Mittal Entropy and Shannon's Random Cipher Result.
Gur Dial, Franquiberto Pessoa
1986Some Preliminary Remarks on the Decimal, Shift an Add-Algorithm (DSA).
F.-P. Heider, Dieter Kraus, M. Welschenbach
1986Some Properties of Sequences Generated by a Windmill Machine.
Bernhard Smeets
1986Tactical Configurations and Threshold Schemes.
A. Ecker
1986The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles.
Muzhong Wang, James L. Massey
1986The NPL Intelligent Token and its Application.
Wyn L. Price
1986The Need for a Standarized Compression Algorithm for Digital Signatures.
Denis Pinkas