EUROCRYPT A*

28 papers

YearTitle / Authors
1988Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings
David Chaum, Wyn L. Price
1987A Public Key Analog Cryptosystem.
George I. Davida, Gilbert G. Walter
1987Alternating Step Generators Controlled by De Bruijn Sequences.
Christoph G. Günther
1987An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations.
David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf
1987Blinding for Unanticipated Signatures.
David Chaum
1987Collision Free Hash Functions and Public Key Signature Schemes.
Ivan Damgård
1987Extension of Brickell's Algorithm for Breaking High Density Knapsacks.
F. Jorissen, Joos Vandewalle, René Govaerts
1987Fast Data Encipherment Algorithm FEAL.
Akihiro Shimizu, Shoji Miyaguchi
1987Finite State Machine Modelling of Cryptographic Systems in Loops.
Franz Pichler
1987Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution.
Thomas Siegenthaler, Amstein Walthert Kleiner, Réjane Forré
1987Hash-Functions Using Modulo-N Operations.
Marc Girault
1987High-Performance Interface Architectures for Cryptographic Hardware.
David P. Anderson, P. Venkat Rangan
1987IC-Cards in High-Security Applications.
Ingrid Schaumüller-Bichl
1987In Memoriam Tore Herlestam (1929 - 1986).
James L. Massey
1987Linear Structures in Blockciphers.
Jan-Hendrik Evertse
1987Message Authentication and Dynamic Passwords.
H. J. Beker, G. M. Cole
1987Message Authentication with Arbitration of Transmitter/Receiver Disputes.
Gustavus J. Simmons
1987Modes of Blockcipher Algorithms and their Protection Against Active Eavesdropping.
Cees J. A. Jansen, Dick E. Boekee
1987Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers.
James L. Massey, Ueli M. Maurer, Muzhong Wang
1987On Privacy Homomorphisms (Extended Abstract).
Ernest F. Brickell, Yacov Yacobi
1987Perfect and Essentially Perfect Authentication Schemes.
Albrecht Beutelspacher
1987Physical Protection of Cryptographic Devices.
Andrew J. Clark
1987Random Sources for Cryptographic Systems.
Gordon B. Agnew
1987Security Considerations in the Design and Implementation of a new DES chip.
Ingrid Verbauwhede, Frank Hoornaert, Joos Vandewalle, Hugo De Man
1987Sequences With Almost Perfect Linear Complexity Profile.
Harald Niederreiter
1987Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators.
Sibylle Mund, Dieter Gollmann, Thomas Beth
1987The RSA Cryptography Processor.
Holger Sedlak
1987When Shift Registers Clock Themselves.
Rainer A. Rueppel