Skip to main content
  • Conference proceedings
  • © 1988

Advances in Cryptology – EUROCRYPT '87

Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 304)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

    Pages I-VII
  2. Sequences And Linear Complexity

    1. In Memoriam Tore Herlestam (1929–1986)

      • James L. Massey
      Pages 3-4
    2. Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution

      • Thomas Siegenthaler, Réjane Forré, Amstein Walthert Kleiner
      Pages 15-23
    3. Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators

      • Sibylle Mund, Dieter Gollmann, Thomas Beth
      Pages 25-35
    4. When Shift Registers Clock Themselves

      • Rainer A. Rueppel
      Pages 53-64
  3. Hardware Topics

    1. Physical Protection of Cryptographic Devices

      • Andrew J. Clark
      Pages 83-93
    2. The RSA Cryptography Processor

      • Holger Sedlak
      Pages 95-105
  4. Public Key Topics

    1. Extension of Brickell’S Algorithm for Breaking High Density Knapsacks

      • F. Jorissen, J. Vandewalle, R. Govaerts
      Pages 109-115
    2. On Privacy Homomorphisms (Extended Abstract)

      • Ernest F. Brickell, Yacov Yacobi
      Pages 117-125
    3. An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations

      • David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf
      Pages 127-141
    4. A Public Key Analog Gyptosystem

      • George I. Davida, Gilbert G. Walter
      Pages 143-147
  5. Authentication and Secure Transactions

    1. Perfect and Essentially Perfect Authentication Schemes

      • Albrecht Beutelspacher
      Pages 167-170
    2. Message Authentication and Dynamic Passwords

      • H J Beker, G. M Cole
      Pages 171-175
    3. IC-Cards in High-Security Applications

      • I. Schaumüller-Bichl
      Pages 177-199
  6. Hash Functions and Signatures

Editors and Affiliations

  • Centre for Mathematics and Computer Science (CWI), Amsterdam, The Netherlands

    David Chaum

  • National Physical Laboratory, Teddington, Middlesex, UK

    Wyn L. Price

Bibliographic Information

  • Book Title: Advances in Cryptology – EUROCRYPT '87

  • Book Subtitle: Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings

  • Editors: David Chaum, Wyn L. Price

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/3-540-39118-5

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Springer Book Archive

  • Copyright Information: Springer-Verlag Berlin Heidelberg 1988

  • Softcover ISBN: 978-3-540-19102-5Published: 13 April 1988

  • eBook ISBN: 978-3-540-39118-0Published: 16 May 2003

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: VII, 316

  • Topics: Cryptology

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access