Thomas Beth (eds.)3540119930, 9783540119937
Table of contents :
Introduction….Pages 1-28
Cryptology – Methods and Maxims….Pages 31-46
Mechanical Cryptographic Devices….Pages 47-48
Cryptanalysis of a Kryha Machine….Pages 49-64
Enigma Variations….Pages 65-68
Encrypting by Random Rotations….Pages 71-128
Analogue Speech Security Systems….Pages 130-146
A Voice Scrambling System for Testing and Demonstration….Pages 147-156
The Rating of Understanding in Secure Voice Communications Systems….Pages 157-163
Analysis of Multiple Access Channel Using Multiple Level FSK….Pages 165-172
Analog Scrambling by the General Fast Fourier Transform….Pages 173-178
Stream Ciphers….Pages 181-188
Multiplexed Sequences: Some Properties of the Minimum Polynomial….Pages 189-206
On Using Prime Polynomials in Crypto Generators….Pages 207-216
Communication Security in Remote Controlled Computer Systems….Pages 219-227
Privacy and Data Protection in Medicine….Pages 228-232
Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding….Pages 235-255
Are Big S-Boxes Best?….Pages 257-262
The Average Cycle Size of The Key Stream in Output Feedback Encipherment….Pages 263-279
Authentication Procedures….Pages 283-288
Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem….Pages 289-306
A New Algorithm for the Solution of the Knapsack Problem….Pages 309-315
Trapdoors in Knapsack Kryptosystems….Pages 316-322
Is the RSA – Scheme safe? (Abstract)….Pages 325-329
Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract)….Pages 331-351
Finite Semigroups and The RSA-Cryptosystem….Pages 353-369
How to Share a Secret….Pages 371-375
Reviews
There are no reviews yet.