Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eurocrypt 1985
Page
Title
3-17
The Contribution of E. B. Fleissner and A. Figl for Today's Cryptography
18-28
On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic Research
31-34
Efficient Factoring Based on Partial Information
35-39
A Public-Key Cryptosystem based on Shift Register Sequences
40-42
A Comment on Niederreiter's Public Key Cryptosystem
43-49
Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System
50-61
Cryptanalysis of the Dickson Scheme
62-72
Simultaneous Security of Bits in the Discrete Log
73-78
On Public-Key Cryptosystems Built using Polynomial Rings
81-95
Is the Data Encryption Standard a Group? (Preliminary Abstract)
96-102
Two New Secret Key Cryptosystems
103-110
Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences
111-115
Authorized Writing for "Write-Once" Memories
119-129
On Functions of Linear Shift Register Sequences
130-134
On Feedforward Transforms and p-Fold Periodic p-Arrays
135-141
Generalized Multiplexed Sequences
142-148
A Note On Sequences Generated by Clock Controlled Shift Registers
149-155
Using Algorithms as Keys in Stream Ciphers
156-160
On the Linear Complexity of Combined Shift Register Sequences
161-166
Analysis of a Nonlinear Feedforward Logic for Binary Sequence Generators
167-188
Linear Complexity and Random Sequences
191-199
Engineering Secure Information Systems
200-207
The Chipcard: An Identification Card With Cryptographic Protection
208-213
Encryption: Needs, Requirements, and SOlutions in Banking Networks
214-220
The Role of Encipherment Services in Distributed Systems
221-230
Modelling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks
231-240
Full Encryption in a Personal Computer System
241-244
Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms
245-253
Networks Without User Observability: Design Options
254-260
The Verifiability of Two-Party Protocols
261-272
The Practice of Authentication
273-277
Message Protection by Spread Spectrum Modulation in a Packet Voice Radio Link