The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
1984 (conf/eurocrypt/84)

  1. G. Ruggiu
    Cryptology and Complexity Theories. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:3-9 [Conf]
  2. Rudolf Lidl
    On Cryptosystems Based on Polynomials and Finite Fields. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:10-15 [Conf]
  3. Josef Pieprzyk
    Algebraical Structures of Cryptographic Transformations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:16-24 [Conf]
  4. Sami Harari
    Non-Linear Non-Commutative Functions for Data Integrity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:25-32 [Conf]
  5. Lawrence H. Ozarow, Aaron D. Wyner
    Wire-Tap Channel II. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:33-50 [Conf]
  6. Andrea Sgarro
    Equivolcations for Homophonic Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:51-61 [Conf]
  7. Marc Davio, Yvo Desmedt, Jean-Jacques Quisquater
    Propagation Characteristics of the DES. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:62-73 [Conf]
  8. James L. Massey, Rainer A. Rueppel
    Linear Ciphers and Random Sequence Generators with Multiple Clocks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:74-87 [Conf]
  9. Thomas Beth, Fred Piper
    The Stop-and-Go Generator. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:88-92 [Conf]
  10. Dieter Gollmann
    Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:93-98 [Conf]
  11. Rainer Vogel
    On the Linear Complexity of Cascaded Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:99-109 [Conf]
  12. Claus-Peter Schnorr, Werner Alexi
    RSA-Bits are 0.5 + epsilon Secure. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:113-126 [Conf]
  13. Oded Goldreich
    On the Number of Close-and-Equal Pairs of Bits in a String. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:127-141 [Conf]
  14. Philippe Delsarte, Yvo Desmedt, Andrew M. Odlyzko, Philippe Piret
    Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:142-149 [Conf]
  15. R. M. F. Goodman, A. J. McAuley
    A New Trapdoor Knapsack Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:150-158 [Conf]
  16. Ronald L. Rivest
    RSA Chips (Past/Present/Future). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:159-165 [Conf]
  17. Carl Pomerance
    The Quadratic Sieve Factoring Algorithm. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:169-182 [Conf]
  18. James A. Davis, Diane B. Holdridge, Gustavus J. Simmons
    Status Report on Factoring (At the Sandia National Laboratories). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:183-215 [Conf]
  19. John Gordon
    Strong Primes are Easy to Find. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:216-223 [Conf]
  20. Andrew M. Odlyzko
    Discrete Logarithms in Finite Fields and Their Cryptographic Significance. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:224-314 [Conf]
  21. R. W. Jones
    User Functions for the Generation and Distribution of Encipherment Keys. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:317-334 [Conf]
  22. Rolf Blom
    An Optimal Class of Symmetric Key Generation Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:335-338 [Conf]
  23. Ben J. M. Smeets
    On the Use of the Binary Multiplying Channel in a Private Communication System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:339-348 [Conf]
  24. Gordon B. Agnew
    Secrecy and Privacy in a Local Area Network Environment. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:349-363 [Conf]
  25. Gustavus J. Simmons
    The Subliminal Channel and Digital Signature. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:364-378 [Conf]
  26. Richard Berger, René Peralta, Tom Tedrick
    A Provably Secure Oblivious Transfer Protocol. [Citation Graph (1, 0)][DBLP]
    EUROCRYPT, 1984, pp:379-386 [Conf]
  27. Oded Goldreich
    On Concurrent Identification Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:387-396 [Conf]
  28. A. Ecker
    Time-division Multiplexing Scramblers: Selecting Permutations and Testing the Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:399-415 [Conf]
  29. A. Bouckaert
    Security of Transportable Computerized Files. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:416-425 [Conf]
  30. S. C. Serpell, C. B. Brookson
    Encryption and Key Manaagement for the ECS Satellite Service. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:426-436 [Conf]
  31. Odoardo Brugia, Salvatore Improta, William Wolfowicz
    An Encryption and Authentication Procedure for Telesurveillance Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:437-445 [Conf]
  32. Ingrid Schaumüller-Bichl, Ernst Piller
    A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:446-454 [Conf]
  33. Jean Goutay
    Smart Card Applications in Security and Data Protection. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:459-463 [Conf]
  34. Yves Giradot
    Bull CP8 Smart Card Uses in Cryptology. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:464-469 [Conf]
  35. H. Groscot
    Estimation of Some Encryption Functions Implemented into Smart Cards. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:470-479 [Conf]
  36. Louis C. Guillou
    Smart Cards and Conditional Access. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:480-489 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002