Conferences in DBLP
Paul Schöbi Perfect Authentication Systems for Data Sources with Arbitrary Statistics. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:1-2 [Conf ] F.-P. Heider , D. Kraus , M. Welschenbach Some Preliminary Remarks on the Decimal, Shift an Add-Algorithm (DSA). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:3- [Conf ] Cees J. A. Jansen Protection Against Active Eavesdropping. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:4-6 [Conf ] Denis Pinkas The Need for a Standarized Compression Algorithm for Digital Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:7- [Conf ] A. S. Glass Could the Smart Card Be Dumb. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:8- [Conf ] Wyn L. Price The NPL Intelligent Token and its Application. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:10-13 [Conf ] Viiveke Fåk Activities of IFIP Working Group 11: 4 on Crypto Management. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:14- [Conf ] René Peralta , Jeroen van de Graaf A Simple an Fast Probabilistic Algorithm for Computing Square Roots Modulo a Prime Number. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:15- [Conf ] Judy H. Moore , Gustavus J. Simmons Cycle Structure of the Weak and Semi-Weak DES Keys. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:16- [Conf ] Yvo Desmedt , Frank Hoornaert , Jean-Jacques Quisquater Several Exhaustive Key Search Machines and DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:17-19 [Conf ] Henri Cloetens , Yvo Desmedt , Luc Bierens , Joos Vandewalle , René Govaerts Additional Properties in the S-Boxes of the DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:20- [Conf ] Ernest F. Brickell Cryptanalysis of the Yagisawa Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:21-22 [Conf ] Anne Bauval Cryptanalysis of Pseudo-Random Number Sequences Generated by a Linear Recurrence of a Given Order. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:23-26 [Conf ] N. S. James , Rudolf Lidl , Harald Niederreiter A Cryptanalytic Attack on the CADE Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:27- [Conf ] Gur Dial , Franquiberto Pessoa Sharma-Mittal Entropy and Shannon's Random Cipher Result. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:28- [Conf ] Gordon B. Agnew Another Look at Redundancy in Cryptographic Systems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:29- [Conf ] Rainer A. Rueppel , Othmar Staffelbach Products of Linear Recurring Sequence with Maximum Complexity. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:30-32 [Conf ] Dieter Gollmann Linear Complexity of Sequences with Period pn . [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:33- [Conf ] Nguyen Quang A Elementary Proof of Rueppel's Linear Complexity Conjecture. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:34- [Conf ] Muzhong Wang , James L. Massey The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:35-36 [Conf ] Bernhard Smeets Some Properties of Sequences Generated by a Windmill Machine. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:37- [Conf ] Tore Herlestam On Linear Shift Registers with Permuted Feedback. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:38-39 [Conf ] C. G. Günther On Some Properties of the Sum of Two Pseudorandom Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:40-41 [Conf ] Thomas Siegenthaler Correlation-Immune Polynomials over Finite Fields. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:42- [Conf ] Franz Pichler On the Walsh-Fourier Analysis of Correlation-Immune Switching Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:43-44 [Conf ] Maurice Beale Properties of De Bruijn Sequences Generated by a Cross-Join Technique. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:45- [Conf ] Albrecht Beutelspacher Geometric Structures as Threshold Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:46- [Conf ] A. Ecker Tactical Configurations and Threshold Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:47- [Conf ] Richard A. Kemmerer Analyzing Encryption Protocols Using Formal Verification Techniques. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:48- [Conf ] Ove Frank , Per Weidenman Controlling Individual Information in Statistics by Coding. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:49- [Conf ] George I. Davida , Yi-Shiung Yeh Multilevel Cryptosecure Relational Database. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:50- [Conf ] Winfried B. Müller , Rupert Nöbauer On Commutative Semigroups of Polynomials and their Application in Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:50- [Conf ] D. D. Buckley , Maurice Beale Public Key Encryption of Stream Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:53-54 [Conf ] David S. P. Khoo , Gregory J. Bird , Jennifer Seberry Encryption Exponent 3 and the Security of RSA. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:55- [Conf ]