default search action
EUROCRYPT 1987: Amsterdam, The Netherlands
- David Chaum, Wyn L. Price:
Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings. Lecture Notes in Computer Science 304, Springer 1988, ISBN 3-540-19102-X
Sequences and Linear Complexity
- James L. Massey:
In Memoriam Tore Herlestam (1929 - 1986). 3-4 - Christoph G. Günther:
Alternating Step Generators Controlled by De Bruijn Sequences. 5-14 - Thomas Siegenthaler, Amstein Walthert Kleiner, Réjane Forré:
Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution. 15-23 - Sibylle Mund, Dieter Gollmann, Thomas Beth:
Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators. 25-35 - Harald Niederreiter:
Sequences With Almost Perfect Linear Complexity Profile. 37-51 - Rainer A. Rueppel:
When Shift Registers Clock Themselves. 53-64 - Franz Pichler:
Finite State Machine Modelling of Cryptographic Systems in Loops. 65-73
Hardware Topics
- Gordon B. Agnew:
Random Sources for Cryptographic Systems. 77-81 - Andrew J. Clark:
Physical Protection of Cryptographic Devices. 83-93 - Holger Sedlak:
The RSA Cryptography Processor. 95-105
Public Key Topics
- F. Jorissen, Joos Vandewalle, René Govaerts:
Extension of Brickell's Algorithm for Breaking High Density Knapsacks. 109-115 - Ernest F. Brickell, Yacov Yacobi:
On Privacy Homomorphisms (Extended Abstract). 117-125 - David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf:
An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations. 127-141 - George I. Davida, Gilbert G. Walter:
A Public Key Analog Cryptosystem. 143-147
Authentication and Secure Transactions
- Gustavus J. Simmons:
Message Authentication with Arbitration of Transmitter/Receiver Disputes. 151-165 - Albrecht Beutelspacher:
Perfect and Essentially Perfect Authentication Schemes. 167-170 - H. J. Beker, G. M. Cole:
Message Authentication and Dynamic Passwords. 171-175 - Ingrid Schaumüller-Bichl:
IC-Cards in High-Security Applications. 177-199
Hash Functions and Signatures
- Ivan Damgård:
Collision Free Hash Functions and Public Key Signature Schemes. 203-216 - Marc Girault:
Hash-Functions Using Modulo-N Operations. 217-226 - David Chaum:
Blinding for Unanticipated Signatures. 227-233
Symmetric Ciphers: Theory
- James L. Massey, Ueli M. Maurer, Muzhong Wang:
Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. 237-247 - Jan-Hendrik Evertse:
Linear Structures in Blockciphers. 249-266 - Akihiro Shimizu, Shoji Miyaguchi:
Fast Data Encipherment Algorithm FEAL. 267-278
Symmetric Ciphers: Application
- Cees J. A. Jansen, Dick E. Boekee:
Modes of Blockcipher Algorithms and their Protection Against Active Eavesdropping. 281-286 - Ingrid Verbauwhede, Frank Hoornaert, Joos Vandewalle, Hugo De Man:
Security Considerations in the Design and Implementation of a new DES chip. 287-300 - David P. Anderson, P. Venkat Rangan:
High-Performance Interface Architectures for Cryptographic Hardware. 301-309
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.