Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eurocrypt 1982
Page
Title
1-30
Introduction
31-48
Cryptology - Methods and Maxims
49-64
Cryptoanalysis of a Kryha Machine
65-68
Enigma Variations
71-128
Encrypting by Random Rotations
130-146
Analog Speech security Systems
147-156
A voice Scrambling System for Testing and Demonstration
157-163
The Rating of Understanding in Secure Voice Communication Systems
165-172
Analysis of Multiple Access Channel using Multiple Level FSK
173-178
Analog Scrambling by the General Fast Fourier Transform
181-188
Stream Ciphers
189-206
Multiplexed Sequences: Some Properties of the Minimum Polynomial
207-216
On Using Prime Polynomials in Crypto Generators
219-227
Communication Security in Remote controlled Computer Systems
228-232
Privacy and Data Protection in Medicine
235-255
Cryptonalysis of the Data Encryption Standard by the Method of Formal Coding
257-262
Are Big S-Boxes Best?
263-279
The average Cycle size of the Key-Stream in Output Feedback Encipherment
283-288
Jean-Marie Goethals, Jean-Jacques Quisquater: Authentication Procedures
289-306
Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem
309-315
A new Algorithm for the Solution of the Knapsack Problem
316-322
Trapdoors in Knapsack Cryptosystems
325-329
Is the RSA Scheme Safe?
331-351
Ein Effizienzvergleich der Factorisierungsverfahren von Morrison-Brillhart und Schroeppel
353-369
Finite Semigroups and the RSA-Cryptosystem
371-375
How to Share a Secret?