Advances in Cryptology — EUROCRYPT’ 85: Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques Linz, Austria, April 1985

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The storage, routing and transmission of information, either in the form of digital data or of analog signals, plays a central role in modern society. To ensure that such information is protected from access by unauthorized persons is an important new challenge. The development of the theory and practical techniques needed to meet this challenge is the goal of current cryptological research. This research is highly varied and multidisciplinary. It is concerned with fundamental problems in mathematics and theoretical computer science as well as with the engineering aspects of complex information systems. Cryptology today ranks among the most active and interesting areas of research in both science and engineering. EUROCRYPT '85 maintained the tradition of the three previous workshops in this series (Paris 1984, Udine 1983, Burg Feuerstein 1982) with its emphasis on recent developments in cryptology, but also made a concerted effort to encompass more traditional topics in cryptology such as shift register theory and system theory. The many papers on these topics in this volume are witness to the success of this effort.

Author(s): Otto J. Horak (auth.), Franz Pichler (eds.)
Series: Lecture Notes in Computer Science 219
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1986

Language: English
Pages: 284
Tags: Input/Output and Data Communications; Coding and Information Theory

The Contribution of E.B. Fleissner and A. Figl for Today’s Cryptography....Pages 3-17
On the history of cryptography during WW2, and possible new directions for cryptographic research....Pages 18-28
Efficient Factoring Based on Partial Information....Pages 31-34
A Public-Key Cryptosystem Based on Shift Register Sequences....Pages 35-39
A Comment on Niederreiter’s Public Key Cryptosystem....Pages 40-42
Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System....Pages 43-49
Cryptanalysis of the Dickson-Scheme....Pages 50-61
Simultaneous Security of Bits in the Discrete Log....Pages 62-72
On Public-Key Cryptosystems Built Using Polynomial Rings....Pages 73-78
Is the Data Encryption Standard a Group? (Preliminary Abstract)....Pages 81-95
Two New Secret Key Cryptosystems....Pages 96-102
Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences....Pages 103-110
Authorized Writing for “Write-Once” Memories....Pages 111-115
On Functions of Linear Shift Register Sequences....Pages 119-129
On Feedforward Transforms and p-Fold Periodic p-Arrays....Pages 130-134
Generalized Multiplexed Sequences....Pages 135-141
A Note on Sequences Generated by Clock Controlled Shift Registers....Pages 142-148
Using Algorithms as Keys in Stream Ciphers....Pages 149-155
On the Linear Complexity of Combined Shift Register Sequences....Pages 156-160
Analysis of a Nonlinear Feedforward Logic for Binary Sequence Generators....Pages 161-166
Linear Complexity and Random Sequences....Pages 167-188
Engineering Secure Information Systems....Pages 191-199
The Chipcard — An Identification Card with Cryptographic Protection....Pages 200-207
Encryption Needs, Requirements and Solutions in Banking Networks....Pages 208-213
The Role of Encipherment Services in Distributed Systems....Pages 214-220
Modeling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks....Pages 221-230
Full Encryption in a Personal Computer System....Pages 231-240
Showing Credentials Without Identification....Pages 241-244
Networks Without User Observability — Design Options....Pages 245-253
The Verifiability of Two-Party Protocols....Pages 254-260
The Practice of Authentication....Pages 261-272
Message Protection by Spread Spectrum Modulation in a Packet Voice Radio Link....Pages 273-277