## Advances in Cryptology - EUROCRYPT '87: Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 ProceedingsThis book contains the proceedings of the EUROCRYPT '87 conference, a workshop on theory and applications of cryptographic techniques held at Amsterdam, April 1987. 26 papers were selected from over twice that number submitted to the program committee. The authors come from Europe, North America, and Japan and represent some of the leading research groups working in the fields of cryptography and data security. The subjects covered include sequences and linear complexity; hardware considerations, including random sources, physical security, and cryptographic algorithm implementation; topics in public key cryptography; authentication and secure transactions; hash functions and signatures; and the theory and application of symmetric ciphers. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

In Memoriam Tore Herlestam 19291986 | 3 |

Generation of Binary Sequences with Controllable | 15 |

Some Remarks on the Cross Correlation Analysis | 25 |

Copyright | |

23 other sections not shown

### Common terms and phrases

additive stream cipher Advances in Cryptology algorithm applications arbiter assume bilinear cipher binary bits blind signature block block ciphers blockcipher byte calculated Chaum check-sum chip choose chosen message attack chosen plaintext attack ciphertext claw free collision free combined scheme Computer Science construction corresponding Crypto Cryptology decryption defined deg(Q denote DES-like cipher described device Discrete Log discrete logarithm enciphered encoding rule encryption EUROCRYPT Evertse example factor FEAL feedback finite floorplan hash function hence IC-cards implementation input integer interface key-minimal keystream knapsack Lemma LFSR linear mapping look-ahead m-sequence maximum length sequence modes modulo operation multiplication NEKMRP output pairs partial linearity permutations plaintext attack possible prime Proc product cipher Proof protocol random result robustly-perfect rounds S-boxes self-decimated sequence shift register sequence signature scheme signer space stream cipher subspace tamper resistant Theorem Theory transmitter vector Walsh-Coefficients