Advances in Cryptology — EUROCRYPT’ 85

Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques Linz, Austria, April 1985

Editors:

ISBN: 978-3-540-16468-5 (Print) 978-3-540-39805-9 (Online)

Table of contents (32 chapters)

previous Page of 2
  1. Front Matter

    Pages I-IX

  2. History of Cryptography

    1. Book Chapter

      Pages 3-17

      The Contribution of E.B. Fleissner and A. Figl for Today’s Cryptography

    2. Book Chapter

      Pages 18-28

      On the history of cryptography during WW2, and possible new directions for cryptographic research

  3. Public Key Cryptography

    1. Book Chapter

      Pages 31-34

      Efficient Factoring Based on Partial Information

    2. Book Chapter

      Pages 35-39

      A Public-Key Cryptosystem Based on Shift Register Sequences

    3. Book Chapter

      Pages 40-42

      A Comment on Niederreiter’s Public Key Cryptosystem

    4. Book Chapter

      Pages 43-49

      Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System

    5. Book Chapter

      Pages 50-61

      Cryptanalysis of the Dickson-Scheme

    6. Book Chapter

      Pages 62-72

      Simultaneous Security of Bits in the Discrete Log

    7. Book Chapter

      Pages 73-78

      On Public-Key Cryptosystems Built Using Polynomial Rings

  4. Secret Key Cryptography

    1. Book Chapter

      Pages 81-95

      Is the Data Encryption Standard a Group? (Preliminary Abstract)

    2. Book Chapter

      Pages 96-102

      Two New Secret Key Cryptosystems

    3. Book Chapter

      Pages 103-110

      Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences

    4. Book Chapter

      Pages 111-115

      Authorized Writing for “Write-Once” Memories

  5. Shiftregister Sequences and Related Topics

    1. Book Chapter

      Pages 119-129

      On Functions of Linear Shift Register Sequences

    2. Book Chapter

      Pages 130-134

      On Feedforward Transforms and p-Fold Periodic p-Arrays

    3. Book Chapter

      Pages 135-141

      Generalized Multiplexed Sequences

    4. Book Chapter

      Pages 142-148

      A Note on Sequences Generated by Clock Controlled Shift Registers

    5. Book Chapter

      Pages 149-155

      Using Algorithms as Keys in Stream Ciphers

    6. Book Chapter

      Pages 156-160

      On the Linear Complexity of Combined Shift Register Sequences

    7. Book Chapter

      Pages 161-166

      Analysis of a Nonlinear Feedforward Logic for Binary Sequence Generators

previous Page of 2