Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eurocrypt 1986
Page
Title
1-2
Perfect Authentication Systems for Data Sources with Arbitrary Statistics
3
Some Preliminary Remarks on the Decimal, Shift an Add-Algorithm (DSA)
4-6
Protection Against Active Eavesdropping
7
The Need for a Standarized Compression Algorithm for Digital Signatures
8
Could the Smart Card Be Dumb
10-13
The NPL Intelligent Token and its Application
14
Activities of IFIP Working Group 11: 4 on Crypto Management
15
A Simple an Fast Probabilistic Algorithm for Computing Square Roots Modulo a Prime Number
16
Cycle Structure of the Weak and Semi-Weak DES Keys
17-19
Several Exhaustive Key Search Machines and DES
20
Additional Properties in the S-Boxes of the DES
21-22
Cryptanalysis of the Yagisawa Public Key Cryptosystem
23-26
Cryptanalysis of Pseudo-Random Number Sequences Generated by a Linear Recurrence of a Given Order
27
A Cryptanalytic Attack on the CADE Cryptosystem
28
Sharma-Mittal Entropy and Shannon's Random Cipher Result
29
Another Look at Redundancy in Cryptographic Systems
30-32
Products of Linear Recurring Sequence with Maximum Complexity
33
Linear Complexity of Sequences with Period p
^{n}
34
Elementary Proof of Rueppel's Linear Complexity Conjecture
35-36
The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles
37
Some Properties of Sequences Generated by a Windmill Machine
38-39
On Linear Shift Registers with Permuted Feedback
40-41
On Some Properties of the Sum of Two Pseudorandom Sequences
42
Correlation-Immune Polynomials over Finite Fields
43-44
On the Walsh-Fourier Analysis of Correlation-Immune Switching Functions
45
Properties of De Bruijn Sequences Generated by a Cross-Join Technique
46
Geometric Structures as Threshold Schemes
47
Tactical Configurations and Threshold Schemes
48
Analyzing Encryption Protocols Using Formal Verification Techniques
49
Controlling Individual Information in Statistics by Coding
50
On Commutative Semigroups of Polynomials and their Application in Cryptography
50
Multilevel Cryptosecure Relational Database
53-54
Public Key Encryption of Stream Ciphers
55
Encryption Exponent 3 and the Security of RSA