Cryptography

Proceedings of the Workshop on Cryptography Burg Feuerstein, Germany, March 29–April 2, 1982

Editors:

ISBN: 978-3-540-11993-7 (Print) 978-3-540-39466-2 (Online)

Table of contents (27 chapters)

previous Page of 2
  1. Introduction

    1. No Access

      Book Chapter

      Pages 1-28

      Introduction

  2. Classical Cryptography

    1. No Access

      Book Chapter

      Pages 31-46

      Cryptology - Methods and Maxims

    2. No Access

      Book Chapter

      Pages 47-48

      Mechanical Cryptographic Devices

    3. No Access

      Book Chapter

      Pages 49-64

      Cryptanalysis of a Kryha Machine

    4. No Access

      Book Chapter

      Pages 65-68

      Enigma Variations

  3. Mathematical Foundations

    1. No Access

      Book Chapter

      Pages 71-128

      Encrypting by Random Rotations

  4. Analogue Scrambling Schemes

    1. No Access

      Book Chapter

      Pages 130-146

      Analogue Speech Security Systems

    2. No Access

      Book Chapter

      Pages 147-156

      A Voice Scrambling System for Testing and Demonstration

    3. No Access

      Book Chapter

      Pages 157-163

      The Rating of Understanding in Secure Voice Communications Systems

    4. No Access

      Book Chapter

      Pages 165-172

      Analysis of Multiple Access Channel Using Multiple Level FSK

    5. No Access

      Book Chapter

      Pages 173-178

      Analog Scrambling by the General Fast Fourier Transform

  5. Stream Ciphers

    1. No Access

      Book Chapter

      Pages 181-188

      Stream Ciphers

    2. No Access

      Book Chapter

      Pages 189-206

      Multiplexed Sequences: Some Properties of the Minimum Polynomial

    3. No Access

      Book Chapter

      Pages 207-216

      On Using Prime Polynomials in Crypto Generators

  6. Cryptography in Large communication Systems

    1. No Access

      Book Chapter

      Pages 219-227

      Communication Security in Remote Controlled Computer Systems

    2. No Access

      Book Chapter

      Pages 228-232

      Privacy and Data Protection in Medicine

  7. The Data Encryption Standard

    1. No Access

      Book Chapter

      Pages 235-255

      Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding

    2. No Access

      Book Chapter

      Pages 257-262

      Are Big S-Boxes Best?

    3. No Access

      Book Chapter

      Pages 263-279

      The Average Cycle Size of The Key Stream in Output Feedback Encipherment

  8. Authentication Systems

    1. No Access

      Book Chapter

      Pages 283-288

      Authentication Procedures

previous Page of 2