×

Advances in cryptology - EUROCRYPT ’88. Workshop on the theory and application of cryptographic techniques, Davos, Switzerland, May 25–27, 1988. Proceedings. (English) Zbl 0651.00027

Lecture Notes in Computer Science 330. Berlin etc.: Springer-Verlag (ISBN 3-540-50251-3). xi, 471 p. (1988).

Show indexed articles as search result.

The articles of this volume will be reviewed individually under the abbreviation “Advances in cryptology. Theory and application of cryptographic techniques, Proc. Workshop, EUROCRYPT ’88, Lect. Notes Comput. Sci. 330 (1988)”.
Indexed articles:
de Soete, Marijke, Some constructions for authentication-secrecy codes [Zbl 0655.94004]
Godlewski, Ph.; Camion, P., Manipulations and errors, detection and localization [Zbl 0655.94005]
Lee, P. J.; Brickell, E. F., An observation on the security of McEliece’s public-key cryptosystem [Zbl 0655.94006]
Tezuka, Shu, A new class of nonlinear functions for running-key generators [Zbl 0655.94007]
Smeets, B. J. M.; Chambers, W. G., Windmill generators: a generalization and an observation of how many there are [Zbl 0655.94008]
Okamoto, Eiji, Substantial number of cryptographic keys and its application to encryption designs [Zbl 0655.94009]
Sgarro, Andrea, A measure of semiequivocation [Zbl 0655.94010]
Günther, Christoph G., A universal algorithm for homophonic coding [Zbl 0655.94011]
He, Jingmin; Lu, Kaicheng, A new probabilistic encryption scheme [Zbl 0655.94012]
Matsumoto, Tsutomu; Imai, Hideki, Public quadratic polynomial-tuples for efficient signature-verification and message-encryption [Zbl 0655.94013]
Gorgui-Naguib, Raouf N.; Dlay, Satnam S., Properties of the Euler totient function modulo 24 and some of its cryptographic implications [Zbl 0656.94007]
Girault, Marc; Cohen, Robert; Campana, Mireille, A generalized birthday attack [Zbl 0656.94008]
Desmedt, Yvo, Subliminal-free authentication and signature [Zbl 0656.94009]
Ding, Cunsheng, Proof of Massey’s conjectured algorithm [Zbl 0656.94010]
Vallée, Brigitte; Girault, Marc; Toffin, Philippe, How to break Okamoto’s cryptosystem by reducing lattice bases [Zbl 0657.94008]
Niederreiter, Harald, The probabilistic theory of linear complexity [Zbl 0657.94009]
Di Porto, Adina; Filipponi, Piero, A probabilistic primality test based on the properties of certain generalized Lucas numbers [Zbl 0658.10006]
Agnew, G. B.; Mullin, R. C.; Vanston, S. A., Fast exponentiation in \(GF(2^ n)\) [Zbl 0659.68059]
Schnorr, C. P., On the construction of random number generators and random function generators [Zbl 0663.65004]
De Soete, Marijke; Vedder, Klaus, Some new classes of geometric threshold schemes [Zbl 0664.51008]
Lin, Dongdai; Liu, Mulan, Linear recurring \(m\)-arrays [Zbl 0669.05003]

MSC:

00B25 Proceedings of conferences of miscellaneous specific interest
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory