Cryptography: Proceedings of the Workshop on Cryptography Burg Feuerstein, Germany, March 29–April 2, 1982

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Author(s): Thomas Beth (eds.)
Series: Lecture Notes in Computer Science 149
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1983

Language: English
Pages: 402
Tags: Coding and Information Theory

Introduction....Pages 1-28
Cryptology - Methods and Maxims....Pages 31-46
Mechanical Cryptographic Devices....Pages 47-48
Cryptanalysis of a Kryha Machine....Pages 49-64
Enigma Variations....Pages 65-68
Encrypting by Random Rotations....Pages 71-128
Analogue Speech Security Systems....Pages 130-146
A Voice Scrambling System for Testing and Demonstration....Pages 147-156
The Rating of Understanding in Secure Voice Communications Systems....Pages 157-163
Analysis of Multiple Access Channel Using Multiple Level FSK....Pages 165-172
Analog Scrambling by the General Fast Fourier Transform....Pages 173-178
Stream Ciphers....Pages 181-188
Multiplexed Sequences: Some Properties of the Minimum Polynomial....Pages 189-206
On Using Prime Polynomials in Crypto Generators....Pages 207-216
Communication Security in Remote Controlled Computer Systems....Pages 219-227
Privacy and Data Protection in Medicine....Pages 228-232
Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding....Pages 235-255
Are Big S-Boxes Best?....Pages 257-262
The Average Cycle Size of The Key Stream in Output Feedback Encipherment....Pages 263-279
Authentication Procedures....Pages 283-288
Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem....Pages 289-306
A New Algorithm for the Solution of the Knapsack Problem....Pages 309-315
Trapdoors in Knapsack Kryptosystems....Pages 316-322
Is the RSA - Scheme safe? (Abstract)....Pages 325-329
Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract)....Pages 331-351
Finite Semigroups and The RSA-Cryptosystem....Pages 353-369
How to Share a Secret....Pages 371-375