## Advances in cryptology--EUROCRYPT '87: Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 : proceedingsThis book contains the proceedings of the EUROCRYPT '87 conference, a workshop on theory and applications of cryptographic techniques held at Amsterdam, April 1987. 26 papers were selected from over twice that number submitted to the program committee. The authors come from Europe, North America, and Japan and represent some of the leading research groups working in the fields of cryptography and data security. The subjects covered include sequences and linear complexity; hardware considerations, including random sources, physical security, and cryptographic algorithm implementation; topics in public key cryptography; authentication and secure transactions; hash functions and signatures; and the theory and application of symmetric ciphers. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

In Memoriam Tore Herlestam 19291986 | |

Contents | i |

Generation of Binary Sequences with Controllable | 15 |

Copyright | |

25 other sections not shown

### Other editions - View all

Advances in Cryptology - EUROCRYPT '87: Workshop on the Theory and ... David Chaum,Wyn L. Price No preview available - 1988 |

### Common terms and phrases

Advances in Cryptology applications arbiter assume authentication code bilinear cipher binary bits block blockcipher byte calculated Chaum cheating check-sum chip choose chosen message attack chosen plaintext attack ciphertext claw free Computer Science construction corresponding Crypto cryptographic defined deg(Q denote DES-like cipher described device Discrete Log discrete logarithm electrons enciphered encoding rule encryption EUROCRYPT example factor FEAL feedback finite state machine hardware hash function hence IC-cards IEEE implementation input integer interface keystream knapsack Lemma LFSR linear complexity profile linear mapping linear structures m-sequence maximum length sequence minimal polynomial modes modulo operation multiplication NEKMRP output pairs permutations plaintext attack prime probability distribution Proc product cipher Proof protocol random receiver recursive result robustly-perfect rounds S-boxes scheme self-decimated sequence shift register sequence signature signer stream cipher subspace tamper resistant Theorem Theory transmitter values vector Walsh-Coefficients