The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
1985 (conf/eurocrypt/85)

  1. Otto J. Horak
    The Contribution of E. B. Fleissner and A. Figl for Today's Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:3-17 [Conf]
  2. Tom Tedrick
    On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic Research. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:18-28 [Conf]
  3. Ronald L. Rivest, Adi Shamir
    Efficient Factoring Based on Partial Information. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:31-34 [Conf]
  4. Harald Niederreiter
    A Public-Key Cryptosystem based on Shift Register Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:35-39 [Conf]
  5. Bernhard Smeets
    A Comment on Niederreiter's Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:40-42 [Conf]
  6. Joos Vandewalle, René Govaerts, W. De Becker, Marc Decroos, G. Speybrouck
    Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:43-49 [Conf]
  7. Winfried B. Müller, Rupert Nöbauer
    Cryptanalysis of the Dickson Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:50-61 [Conf]
  8. René Peralta
    Simultaneous Security of Bits in the Discrete Log. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:62-72 [Conf]
  9. Josef Pieprzyk
    On Public-Key Cryptosystems Built using Polynomial Rings. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:73-78 [Conf]
  10. Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman
    Is the Data Encryption Standard a Group? (Preliminary Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:81-95 [Conf]
  11. Henk Meijer, Selim G. Akl
    Two New Secret Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:96-102 [Conf]
  12. Thomas Siegenthaler
    Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:103-110 [Conf]
  13. Philippe Godlewski, Gérard D. Cohen
    Authorized Writing for "Write-Once" Memories. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:111-115 [Conf]
  14. Tore Herlestam
    On Functions of Linear Shift Register Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:119-129 [Conf]
  15. Dong-sheng Chen, Zong-Duo Dai
    On Feedforward Transforms and p-Fold Periodic p-Arrays. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:130-134 [Conf]
  16. Mulan Liu, Zhe-xian Wan
    Generalized Multiplexed Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:135-141 [Conf]
  17. Bernhard Smeets
    A Note On Sequences Generated by Clock Controlled Shift Registers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:142-148 [Conf]
  18. Neal R. Wagner, Paul Putter, Marianne R. Cain
    Using Algorithms as Keys in Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:149-155 [Conf]
  19. Lennart Brynielsson
    On the Linear Complexity of Combined Shift Register Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:156-160 [Conf]
  20. J. Bernasconi, C. G. Günther
    Analysis of a Nonlinear Feedforward Logic for Binary Sequence Generators. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:161-166 [Conf]
  21. Rainer A. Rueppel
    Linear Complexity and Random Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:167-188 [Conf]
  22. Donald W. Davies, Wyn L. Price
    Engineering Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:191-199 [Conf]
  23. Thomas Krivachy
    The Chipcard: An Identification Card With Cryptographic Protection. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:200-207 [Conf]
  24. U. Rimensberger
    Encryption: Needs, Requirements, and SOlutions in Banking Networks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:208-213 [Conf]
  25. R. W. Jones, M. S. J. Baxter
    The Role of Encipherment Services in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:214-220 [Conf]
  26. Gordon B. Agnew
    Modelling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:221-230 [Conf]
  27. Robert L. Bradey, Ian G. Graham
    Full Encryption in a Personal Computer System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:231-240 [Conf]
  28. David Chaum
    Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:241-244 [Conf]
  29. Andreas Pfitzmann, Michael Waidner
    Networks Without User Observability: Design Options. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:245-253 [Conf]
  30. Ronald V. Book, Friedrich Otto
    The Verifiability of Two-Party Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:254-260 [Conf]
  31. Gustavus J. Simmons
    The Practice of Authentication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:261-272 [Conf]
  32. M. Kowatsch, B. O. Eichinger, F. J. Seifert
    Message Protection by Spread Spectrum Modulation in a Packet Voice Radio Link. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:273-277 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002