Conferences in DBLP
G. Ruggiu Cryptology and Complexity Theories. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:3-9 [Conf ] Rudolf Lidl On Cryptosystems Based on Polynomials and Finite Fields. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:10-15 [Conf ] Josef Pieprzyk Algebraical Structures of Cryptographic Transformations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:16-24 [Conf ] Sami Harari Non-Linear Non-Commutative Functions for Data Integrity. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:25-32 [Conf ] Lawrence H. Ozarow , Aaron D. Wyner Wire-Tap Channel II. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:33-50 [Conf ] Andrea Sgarro Equivolcations for Homophonic Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:51-61 [Conf ] Marc Davio , Yvo Desmedt , Jean-Jacques Quisquater Propagation Characteristics of the DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:62-73 [Conf ] James L. Massey , Rainer A. Rueppel Linear Ciphers and Random Sequence Generators with Multiple Clocks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:74-87 [Conf ] Thomas Beth , Fred Piper The Stop-and-Go Generator. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:88-92 [Conf ] Dieter Gollmann Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:93-98 [Conf ] Rainer Vogel On the Linear Complexity of Cascaded Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:99-109 [Conf ] Claus-Peter Schnorr , Werner Alexi RSA-Bits are 0.5 + epsilon Secure. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:113-126 [Conf ] Oded Goldreich On the Number of Close-and-Equal Pairs of Bits in a String. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:127-141 [Conf ] Philippe Delsarte , Yvo Desmedt , Andrew M. Odlyzko , Philippe Piret Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:142-149 [Conf ] R. M. F. Goodman , A. J. McAuley A New Trapdoor Knapsack Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:150-158 [Conf ] Ronald L. Rivest RSA Chips (Past/Present/Future). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:159-165 [Conf ] Carl Pomerance The Quadratic Sieve Factoring Algorithm. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:169-182 [Conf ] James A. Davis , Diane B. Holdridge , Gustavus J. Simmons Status Report on Factoring (At the Sandia National Laboratories). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:183-215 [Conf ] John Gordon Strong Primes are Easy to Find. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:216-223 [Conf ] Andrew M. Odlyzko Discrete Logarithms in Finite Fields and Their Cryptographic Significance. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:224-314 [Conf ] R. W. Jones User Functions for the Generation and Distribution of Encipherment Keys. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:317-334 [Conf ] Rolf Blom An Optimal Class of Symmetric Key Generation Systems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:335-338 [Conf ] Ben J. M. Smeets On the Use of the Binary Multiplying Channel in a Private Communication System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:339-348 [Conf ] Gordon B. Agnew Secrecy and Privacy in a Local Area Network Environment. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:349-363 [Conf ] Gustavus J. Simmons The Subliminal Channel and Digital Signature. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:364-378 [Conf ] Richard Berger , René Peralta , Tom Tedrick A Provably Secure Oblivious Transfer Protocol. [Citation Graph (1, 0)][DBLP ] EUROCRYPT, 1984, pp:379-386 [Conf ] Oded Goldreich On Concurrent Identification Protocols. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:387-396 [Conf ] A. Ecker Time-division Multiplexing Scramblers: Selecting Permutations and Testing the Systems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:399-415 [Conf ] A. Bouckaert Security of Transportable Computerized Files. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:416-425 [Conf ] S. C. Serpell , C. B. Brookson Encryption and Key Manaagement for the ECS Satellite Service. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:426-436 [Conf ] Odoardo Brugia , Salvatore Improta , William Wolfowicz An Encryption and Authentication Procedure for Telesurveillance Systems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:437-445 [Conf ] Ingrid Schaumüller-Bichl , Ernst Piller A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:446-454 [Conf ] Jean Goutay Smart Card Applications in Security and Data Protection. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:459-463 [Conf ] Yves Giradot Bull CP8 Smart Card Uses in Cryptology. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:464-469 [Conf ] H. Groscot Estimation of Some Encryption Functions Implemented into Smart Cards. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:470-479 [Conf ] Louis C. Guillou Smart Cards and Conditional Access. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:480-489 [Conf ]