Conferences in DBLP
Otto J. Horak The Contribution of E. B. Fleissner and A. Figl for Today's Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:3-17 [Conf ] Tom Tedrick On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic Research. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:18-28 [Conf ] Ronald L. Rivest , Adi Shamir Efficient Factoring Based on Partial Information. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:31-34 [Conf ] Harald Niederreiter A Public-Key Cryptosystem based on Shift Register Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:35-39 [Conf ] Bernhard Smeets A Comment on Niederreiter's Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:40-42 [Conf ] Joos Vandewalle , René Govaerts , W. De Becker , Marc Decroos , G. Speybrouck Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:43-49 [Conf ] Winfried B. Müller , Rupert Nöbauer Cryptanalysis of the Dickson Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:50-61 [Conf ] René Peralta Simultaneous Security of Bits in the Discrete Log. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:62-72 [Conf ] Josef Pieprzyk On Public-Key Cryptosystems Built using Polynomial Rings. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:73-78 [Conf ] Burton S. Kaliski Jr. , Ronald L. Rivest , Alan T. Sherman Is the Data Encryption Standard a Group? (Preliminary Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:81-95 [Conf ] Henk Meijer , Selim G. Akl Two New Secret Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:96-102 [Conf ] Thomas Siegenthaler Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:103-110 [Conf ] Philippe Godlewski , Gérard D. Cohen Authorized Writing for "Write-Once" Memories. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:111-115 [Conf ] Tore Herlestam On Functions of Linear Shift Register Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:119-129 [Conf ] Dong-sheng Chen , Zong-Duo Dai On Feedforward Transforms and p-Fold Periodic p-Arrays. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:130-134 [Conf ] Mulan Liu , Zhe-xian Wan Generalized Multiplexed Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:135-141 [Conf ] Bernhard Smeets A Note On Sequences Generated by Clock Controlled Shift Registers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:142-148 [Conf ] Neal R. Wagner , Paul Putter , Marianne R. Cain Using Algorithms as Keys in Stream Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:149-155 [Conf ] Lennart Brynielsson On the Linear Complexity of Combined Shift Register Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:156-160 [Conf ] J. Bernasconi , C. G. Günther Analysis of a Nonlinear Feedforward Logic for Binary Sequence Generators. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:161-166 [Conf ] Rainer A. Rueppel Linear Complexity and Random Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:167-188 [Conf ] Donald W. Davies , Wyn L. Price Engineering Secure Information Systems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:191-199 [Conf ] Thomas Krivachy The Chipcard: An Identification Card With Cryptographic Protection. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:200-207 [Conf ] U. Rimensberger Encryption: Needs, Requirements, and SOlutions in Banking Networks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:208-213 [Conf ] R. W. Jones , M. S. J. Baxter The Role of Encipherment Services in Distributed Systems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:214-220 [Conf ] Gordon B. Agnew Modelling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:221-230 [Conf ] Robert L. Bradey , Ian G. Graham Full Encryption in a Personal Computer System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:231-240 [Conf ] David Chaum Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:241-244 [Conf ] Andreas Pfitzmann , Michael Waidner Networks Without User Observability: Design Options. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:245-253 [Conf ] Ronald V. Book , Friedrich Otto The Verifiability of Two-Party Protocols. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:254-260 [Conf ] Gustavus J. Simmons The Practice of Authentication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:261-272 [Conf ] M. Kowatsch , B. O. Eichinger , F. J. Seifert Message Protection by Spread Spectrum Modulation in a Packet Voice Radio Link. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:273-277 [Conf ]