Advances in Cryptology — EUROCRYPT’ 87

Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, The Netherlands, April 13–15, 1987 Proceedings

Editors:

ISBN: 978-3-540-19102-5 (Print) 978-3-540-39118-0 (Online)

Table of contents (27 chapters)

previous Page of 2
  1. Sequences And Linear Complexity

    1. Book Chapter

      Pages 3-4

      In Memoriam Tore Herlestam (1929–1986)

    2. Book Chapter

      Pages 5-14

      Alternating Step Generators Controlled by De Bruijn Sequences

    3. Book Chapter

      Pages 15-23

      Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution

    4. Book Chapter

      Pages 25-35

      Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators

    5. Book Chapter

      Pages 37-51

      Sequences with Almost Perfect Linear Complexity Profile

    6. Book Chapter

      Pages 53-64

      When Shift Registers Clock Themselves

    7. Book Chapter

      Pages 65-73

      Finite State Machine Modelling of Cryptographic Systems in Loops

  2. Hardware Topics

    1. Book Chapter

      Pages 77-81

      Random Sources for Cryptographic Systems

    2. Book Chapter

      Pages 83-93

      Physical Protection of Cryptographic Devices

    3. Book Chapter

      Pages 95-105

      The RSA Cryptography Processor

  3. Public Key Topics

    1. Book Chapter

      Pages 109-115

      Extension of Brickell’S Algorithm for Breaking High Density Knapsacks

    2. Book Chapter

      Pages 117-125

      On Privacy Homomorphisms (Extended Abstract)

    3. Book Chapter

      Pages 127-141

      An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations

    4. Book Chapter

      Pages 143-147

      A Public Key Analog Gyptosystem

  4. Authentication and Secure Transactions

    1. Book Chapter

      Pages 151-165

      Message Authentication with Arbitration of Transmitter/Receiver Disputes

    2. Book Chapter

      Pages 167-170

      Perfect and Essentially Perfect Authentication Schemes

    3. Book Chapter

      Pages 171-175

      Message Authentication and Dynamic Passwords

    4. Book Chapter

      Pages 177-199

      IC-Cards in High-Security Applications

  5. Hash Functions and Signatures

    1. Book Chapter

      Pages 203-216

      Collision Free Hash Functions and Public Key Signature Schemes

    2. Book Chapter

      Pages 217-226

      Hash-Functions Using Modulo-N Operations

previous Page of 2