The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
1986 (conf/eurocrypt/86)

  1. Paul Schöbi
    Perfect Authentication Systems for Data Sources with Arbitrary Statistics. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:1-2 [Conf]
  2. F.-P. Heider, D. Kraus, M. Welschenbach
    Some Preliminary Remarks on the Decimal, Shift an Add-Algorithm (DSA). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:3- [Conf]
  3. Cees J. A. Jansen
    Protection Against Active Eavesdropping. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:4-6 [Conf]
  4. Denis Pinkas
    The Need for a Standarized Compression Algorithm for Digital Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:7- [Conf]
  5. A. S. Glass
    Could the Smart Card Be Dumb. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:8- [Conf]
  6. Wyn L. Price
    The NPL Intelligent Token and its Application. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:10-13 [Conf]
  7. Viiveke Fåk
    Activities of IFIP Working Group 11: 4 on Crypto Management. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:14- [Conf]
  8. René Peralta, Jeroen van de Graaf
    A Simple an Fast Probabilistic Algorithm for Computing Square Roots Modulo a Prime Number. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:15- [Conf]
  9. Judy H. Moore, Gustavus J. Simmons
    Cycle Structure of the Weak and Semi-Weak DES Keys. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:16- [Conf]
  10. Yvo Desmedt, Frank Hoornaert, Jean-Jacques Quisquater
    Several Exhaustive Key Search Machines and DES. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:17-19 [Conf]
  11. Henri Cloetens, Yvo Desmedt, Luc Bierens, Joos Vandewalle, René Govaerts
    Additional Properties in the S-Boxes of the DES. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:20- [Conf]
  12. Ernest F. Brickell
    Cryptanalysis of the Yagisawa Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:21-22 [Conf]
  13. Anne Bauval
    Cryptanalysis of Pseudo-Random Number Sequences Generated by a Linear Recurrence of a Given Order. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:23-26 [Conf]
  14. N. S. James, Rudolf Lidl, Harald Niederreiter
    A Cryptanalytic Attack on the CADE Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:27- [Conf]
  15. Gur Dial, Franquiberto Pessoa
    Sharma-Mittal Entropy and Shannon's Random Cipher Result. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:28- [Conf]
  16. Gordon B. Agnew
    Another Look at Redundancy in Cryptographic Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:29- [Conf]
  17. Rainer A. Rueppel, Othmar Staffelbach
    Products of Linear Recurring Sequence with Maximum Complexity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:30-32 [Conf]
  18. Dieter Gollmann
    Linear Complexity of Sequences with Period pn. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:33- [Conf]
  19. Nguyen Quang A
    Elementary Proof of Rueppel's Linear Complexity Conjecture. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:34- [Conf]
  20. Muzhong Wang, James L. Massey
    The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:35-36 [Conf]
  21. Bernhard Smeets
    Some Properties of Sequences Generated by a Windmill Machine. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:37- [Conf]
  22. Tore Herlestam
    On Linear Shift Registers with Permuted Feedback. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:38-39 [Conf]
  23. C. G. Günther
    On Some Properties of the Sum of Two Pseudorandom Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:40-41 [Conf]
  24. Thomas Siegenthaler
    Correlation-Immune Polynomials over Finite Fields. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:42- [Conf]
  25. Franz Pichler
    On the Walsh-Fourier Analysis of Correlation-Immune Switching Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:43-44 [Conf]
  26. Maurice Beale
    Properties of De Bruijn Sequences Generated by a Cross-Join Technique. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:45- [Conf]
  27. Albrecht Beutelspacher
    Geometric Structures as Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:46- [Conf]
  28. A. Ecker
    Tactical Configurations and Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:47- [Conf]
  29. Richard A. Kemmerer
    Analyzing Encryption Protocols Using Formal Verification Techniques. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:48- [Conf]
  30. Ove Frank, Per Weidenman
    Controlling Individual Information in Statistics by Coding. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:49- [Conf]
  31. George I. Davida, Yi-Shiung Yeh
    Multilevel Cryptosecure Relational Database. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:50- [Conf]
  32. Winfried B. Müller, Rupert Nöbauer
    On Commutative Semigroups of Polynomials and their Application in Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:50- [Conf]
  33. D. D. Buckley, Maurice Beale
    Public Key Encryption of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:53-54 [Conf]
  34. David S. P. Khoo, Gregory J. Bird, Jennifer Seberry
    Encryption Exponent 3 and the Security of RSA. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:55- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002