|
Conferences in DBLP
- Thomas Beth
Introduction. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:1-30 [Conf]
- Friedrich L. Bauer
Cryptology - Methods and Maxims. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:31-48 [Conf]
- Alan G. Konheim
Cryptoanalysis of a Kryha Machine. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:49-64 [Conf]
- H. R. Schuchmann
Enigma Variations. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:65-68 [Conf]
- N. J. A. Sloane
Encrypting by Random Rotations. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:71-128 [Conf]
- H. J. Beker
Analog Speech security Systems. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:130-146 [Conf]
- Klaus Wirl, Peter Hess
A voice Scrambling System for Testing and Demonstration. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:147-156 [Conf]
- Klaus-P. Timmann
The Rating of Understanding in Secure Voice Communication Systems. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:157-163 [Conf]
- László Györfi, István Kerekes
Analysis of Multiple Access Channel using Multiple Level FSK. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:165-172 [Conf]
- Franz Pichler
Analog Scrambling by the General Fast Fourier Transform. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:173-178 [Conf]
- Fred Piper
Stream Ciphers. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:181-188 [Conf]
- S. M. Jennings
Multiplexed Sequences: Some Properties of the Minimum Polynomial. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:189-206 [Conf]
- Tore Herlestam
On Using Prime Polynomials in Crypto Generators. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:207-216 [Conf]
- M. R. Oberman
Communication Security in Remote controlled Computer Systems. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:219-227 [Conf]
- Lothar Horbach
Privacy and Data Protection in Medicine. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:228-232 [Conf]
- Ingrid Schaumüller-Bichl
Cryptonalysis of the Data Encryption Standard by the Method of Formal Coding. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:235-255 [Conf]
- J. A. Gordon, H. Retkin
Are Big S-Boxes Best? [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:257-262 [Conf]
- Donald W. Davies, Graeme I. P. Parkin
The average Cycle size of the Key-Stream in Output Feedback Encipherment. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:263-279 [Conf]
- Marc Davio
Jean-Marie Goethals, Jean-Jacques Quisquater: Authentication Procedures. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:283-288 [Conf]
- P. Schöbe, James L. Massey
Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:289-306 [Conf]
- Ingemar Ingemarsson
A new Algorithm for the Solution of the Knapsack Problem. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:309-315 [Conf]
- R. Eier, Helmut Lagger
Trapdoors in Knapsack Cryptosystems. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:316-322 [Conf]
- Claus-Peter Schnorr
Is the RSA Scheme Safe? [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:325-329 [Conf]
- Jürgen Sattler, Claus-Peter Schnorr
Ein Effizienzvergleich der Factorisierungsverfahren von Morrison-Brillhart und Schroeppel. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:331-351 [Conf]
- A. Ecker
Finite Semigroups and the RSA-Cryptosystem. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:353-369 [Conf]
- Maurice Mignotte
How to Share a Secret? [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:371-375 [Conf]
|