Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eurocrypt 1984
Page
Title
3-9
Cryptology and Complexity Theories
10-15
On Cryptosystems Based on Polynomials and Finite Fields
16-24
Algebraical Structures of Cryptographic Transformations
25-32
Non-Linear Non-Commutative Functions for Data Integrity
33-50
Wire-Tap Channel II
51-61
Equivolcations for Homophonic Ciphers
62-73
Propagation Characteristics of the DES
74-87
Linear Ciphers and Random Sequence Generators with Multiple Clocks
88-92
The Stop-and-Go Generator
93-98
Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers
99-109
On the Linear Complexity of Cascaded Sequences
113-126
RSA-Bits are 0.5 + epsilon Secure
127-141
On the Number of Close-and-Equal Pairs of Bits in a String
142-149
Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme
150-158
A New Trapdoor Knapsack Public-Key Cryptosystem
159-165
RSA Chips (Past/Present/Future)
169-182
The Quadratic Sieve Factoring Algorithm
183-215
Status Report on Factoring (At the Sandia National Laboratories)
216-223
Strong Primes are Easy to Find
224-314
Discrete Logarithms in Finite Fields and Their Cryptographic Significance
317-334
User Functions for the Generation and Distribution of Encipherment Keys
335-338
An Optimal Class of Symmetric Key Generation Systems
339-348
On the Use of the Binary Multiplying Channel in a Private Communication System
349-363
Secrecy and Privacy in a Local Area Network Environment
364-378
The Subliminal Channel and Digital Signature
379-386
A Provably Secure Oblivious Transfer Protocol
387-396
On Concurrent Identification Protocols
399-415
Time-division Multiplexing Scramblers: Selecting Permutations and Testing the Systems
416-425
Security of Transportable Computerized Files
426-436
Encryption and Key Manaagement for the ECS Satellite Service
437-445
An Encryption and Authentication Procedure for Telesurveillance Systems
446-454
A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques
459-463
Smart Card Applications in Security and Data Protection
464-469
Bull CP8 Smart Card Uses in Cryptology
470-479
Estimation of Some Encryption Functions Implemented into Smart Cards
480-489
Smart Cards and Conditional Access