Author(s): Thomas Beth (eds.)
Series: Lecture Notes in Computer Science 149
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1983
Language: English
Pages: 402
Tags: Coding and Information Theory
Introduction....Pages 1-28
Cryptology - Methods and Maxims....Pages 31-46
Mechanical Cryptographic Devices....Pages 47-48
Cryptanalysis of a Kryha Machine....Pages 49-64
Enigma Variations....Pages 65-68
Encrypting by Random Rotations....Pages 71-128
Analogue Speech Security Systems....Pages 130-146
A Voice Scrambling System for Testing and Demonstration....Pages 147-156
The Rating of Understanding in Secure Voice Communications Systems....Pages 157-163
Analysis of Multiple Access Channel Using Multiple Level FSK....Pages 165-172
Analog Scrambling by the General Fast Fourier Transform....Pages 173-178
Stream Ciphers....Pages 181-188
Multiplexed Sequences: Some Properties of the Minimum Polynomial....Pages 189-206
On Using Prime Polynomials in Crypto Generators....Pages 207-216
Communication Security in Remote Controlled Computer Systems....Pages 219-227
Privacy and Data Protection in Medicine....Pages 228-232
Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding....Pages 235-255
Are Big S-Boxes Best?....Pages 257-262
The Average Cycle Size of The Key Stream in Output Feedback Encipherment....Pages 263-279
Authentication Procedures....Pages 283-288
Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem....Pages 289-306
A New Algorithm for the Solution of the Knapsack Problem....Pages 309-315
Trapdoors in Knapsack Kryptosystems....Pages 316-322
Is the RSA - Scheme safe? (Abstract)....Pages 325-329
Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract)....Pages 331-351
Finite Semigroups and The RSA-Cryptosystem....Pages 353-369
How to Share a Secret....Pages 371-375