Advances in Cryptology Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984

Bibliographic Details
Other Authors: Beth, Thomas (Editor), Cot, Norbert (Editor), Ingemarsson, Ingemar (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 1985, 1985
Edition:1st ed. 1985
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
Table of Contents:
  • The Quadratic Sieve Factoring Algorithm
  • Status Report on Factoring (At the Sandia National Laboratories)
  • Strong Primes are Easy to Find
  • Discrete logarithms in finite fields and their cryptographic significance
  • Channels, Networks, Key Distribution, Protocols
  • User Functions for the Generation and Distribution of Encipherment Keys
  • An Optimal Class of Symmetric Key Generation Systems
  • On the Use of the Binary Multiplying Channel in a Private Communication System
  • Secrecy and Privacy in a Local Area Network Environment
  • The Subliminal Channel and Digital Signatures
  • A Provably Secure Oblivious Transfer Protocol
  • On Concurrent Identification Protocols (Extended Abstract)
  • Applications
  • Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System
  • Security of Transportable ComputerizedFiles
  • Encryption and Key Management for the ECS Statellite Service
  • An Encryption and Authentification Procedure for Telesurveillance Systems
  • A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques
  • Smart Cards
  • Session on Smart Cards Tuesday April 10
  • Smart Card Applications in Security and Data Protection
  • Bull CP8 Smart Card Uses in Cryptology
  • Estimation of some Encryption Functions Implemented into Smart Cards
  • Smart Cards and Conditional Access
  • General Theory, Classical Methods
  • Cryptology and Complexity Theories
  • On Cryptosystems Based on Polynomials and Finite Fields
  • Algebraical Structures of Cryptographic Transformations
  • Non Linear Non Commutative Functions for Data Integrity
  • Wire-Tap Channel II
  • Equivocations for Homophonic Ciphers
  • Propagation Characteristics of the DES
  • Linear Ciphers and Random Sequence Generators with Multiple Clocks
  • The Stop-and-Go-Generator
  • Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers
  • On the linear complexity of cascaded sequences
  • Public-Key Systems
  • RSA-bits are 0.5 + ? secure
  • On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract)
  • Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme
  • A New Trapdoor Knapsack Public Key Cryptosystem
  • RSA Chips (Past/Present/Future) (Extended abstract)
  • Number Theoretical Papers