Advances in Cryptology — EUROCRYPT’ 85

Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques Linz, Austria, April 1985

  • Franz Pichler
Conference proceedings EUROCRYPT 1985

DOI: 10.1007/3-540-39805-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 219)

Table of contents (32 papers)

  1. Front Matter
    Pages I-IX
  2. History of Cryptography

  3. Public Key Cryptography

  4. Secret Key Cryptography

    1. Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman
      Pages 81-95
    2. Henk Meijer, Selim Akl
      Pages 96-102
    3. Philippe Godlewski, Gérard D. Cohen
      Pages 111-115
  5. Shiftregister Sequences and Related Topics

    1. Dong-sheng Chen, Zong-duo Dai
      Pages 130-134
    2. Mu-Lan Liu, Zhe-xian Wan
      Pages 135-141
    3. Neal R. Wagner, Paul S. Putter, Marianne R. Cain
      Pages 149-155

About these proceedings

Introduction

The storage, routing and transmission of information, either in the form of digital data or of analog signals, plays a central role in modern society. To ensure that such information is protected from access by unauthorized persons is an important new challenge. The development of the theory and practical techniques needed to meet this challenge is the goal of current cryptological research. This research is highly varied and multidisciplinary. It is concerned with fundamental problems in mathematics and theoretical computer science as well as with the engineering aspects of complex information systems. Cryptology today ranks among the most active and interesting areas of research in both science and engineering. EUROCRYPT '85 maintained the tradition of the three previous workshops in this series (Paris 1984, Udine 1983, Burg Feuerstein 1982) with its emphasis on recent developments in cryptology, but also made a concerted effort to encompass more traditional topics in cryptology such as shift register theory and system theory. The many papers on these topics in this volume are witness to the success of this effort.

Keywords

authentication computer cryptoanalysis cryptography cryptology cryptosystems data encryption encryption information networks privacy storage

Editors and affiliations

  • Franz Pichler
    • 1
  1. 1.Institute of Systems Science Department of Systems Theory and Information EngineeringJohannes Kepler University LinzLinzAustria

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1986
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-16468-5
  • Online ISBN 978-3-540-39805-9
  • Series Print ISSN 0302-9743