Otto J. Horak (auth.), Franz Pichler (eds.)3540164685, 9783540164685
Table of contents :
The Contribution of E.B. Fleissner and A. Figl for Today’s Cryptography….Pages 3-17
On the history of cryptography during WW2, and possible new directions for cryptographic research….Pages 18-28
Efficient Factoring Based on Partial Information….Pages 31-34
A Public-Key Cryptosystem Based on Shift Register Sequences….Pages 35-39
A Comment on Niederreiter’s Public Key Cryptosystem….Pages 40-42
Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System….Pages 43-49
Cryptanalysis of the Dickson-Scheme….Pages 50-61
Simultaneous Security of Bits in the Discrete Log….Pages 62-72
On Public-Key Cryptosystems Built Using Polynomial Rings….Pages 73-78
Is the Data Encryption Standard a Group? (Preliminary Abstract)….Pages 81-95
Two New Secret Key Cryptosystems….Pages 96-102
Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences….Pages 103-110
Authorized Writing for “Write-Once” Memories….Pages 111-115
On Functions of Linear Shift Register Sequences….Pages 119-129
On Feedforward Transforms and p-Fold Periodic p-Arrays….Pages 130-134
Generalized Multiplexed Sequences….Pages 135-141
A Note on Sequences Generated by Clock Controlled Shift Registers….Pages 142-148
Using Algorithms as Keys in Stream Ciphers….Pages 149-155
On the Linear Complexity of Combined Shift Register Sequences….Pages 156-160
Analysis of a Nonlinear Feedforward Logic for Binary Sequence Generators….Pages 161-166
Linear Complexity and Random Sequences….Pages 167-188
Engineering Secure Information Systems….Pages 191-199
The Chipcard — An Identification Card with Cryptographic Protection….Pages 200-207
Encryption Needs, Requirements and Solutions in Banking Networks….Pages 208-213
The Role of Encipherment Services in Distributed Systems….Pages 214-220
Modeling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks….Pages 221-230
Full Encryption in a Personal Computer System….Pages 231-240
Showing Credentials Without Identification….Pages 241-244
Networks Without User Observability — Design Options….Pages 245-253
The Verifiability of Two-Party Protocols….Pages 254-260
The Practice of Authentication….Pages 261-272
Message Protection by Spread Spectrum Modulation in a Packet Voice Radio Link….Pages 273-277
Reviews
There are no reviews yet.