Advances in Cryptology Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
1985, 1985
|
Edition: | 1st ed. 1985 |
Series: | Lecture Notes in Computer Science
|
Subjects: | |
Online Access: | |
Collection: | Springer Book Archives -2004 - Collection details see MPG.ReNa |
Table of Contents:
- The Quadratic Sieve Factoring Algorithm
- Status Report on Factoring (At the Sandia National Laboratories)
- Strong Primes are Easy to Find
- Discrete logarithms in finite fields and their cryptographic significance
- Channels, Networks, Key Distribution, Protocols
- User Functions for the Generation and Distribution of Encipherment Keys
- An Optimal Class of Symmetric Key Generation Systems
- On the Use of the Binary Multiplying Channel in a Private Communication System
- Secrecy and Privacy in a Local Area Network Environment
- The Subliminal Channel and Digital Signatures
- A Provably Secure Oblivious Transfer Protocol
- On Concurrent Identification Protocols (Extended Abstract)
- Applications
- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System
- Security of Transportable ComputerizedFiles
- Encryption and Key Management for the ECS Statellite Service
- An Encryption and Authentification Procedure for Telesurveillance Systems
- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques
- Smart Cards
- Session on Smart Cards Tuesday April 10
- Smart Card Applications in Security and Data Protection
- Bull CP8 Smart Card Uses in Cryptology
- Estimation of some Encryption Functions Implemented into Smart Cards
- Smart Cards and Conditional Access
- General Theory, Classical Methods
- Cryptology and Complexity Theories
- On Cryptosystems Based on Polynomials and Finite Fields
- Algebraical Structures of Cryptographic Transformations
- Non Linear Non Commutative Functions for Data Integrity
- Wire-Tap Channel II
- Equivocations for Homophonic Ciphers
- Propagation Characteristics of the DES
- Linear Ciphers and Random Sequence Generators with Multiple Clocks
- The Stop-and-Go-Generator
- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers
- On the linear complexity of cascaded sequences
- Public-Key Systems
- RSA-bits are 0.5 + ? secure
- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract)
- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme
- A New Trapdoor Knapsack Public Key Cryptosystem
- RSA Chips (Past/Present/Future) (Extended abstract)
- Number Theoretical Papers