Abstract is missing.
- The Contribution of E. B. Fleissner and A. Figl for Today s CryptographyOtto J. Horak. 3-17 [doi]
- On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic ResearchTom Tedrick. 18-28 [doi]
- Efficient Factoring Based on Partial InformationRonald L. Rivest, Adi Shamir. 31-34 [doi]
- A Public-Key Cryptosystem based on Shift Register SequencesHarald Niederreiter. 35-39 [doi]
- A Comment on Niederreiter s Public Key CryptosystemBernhard Smeets. 40-42 [doi]
- Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling SystemJoos Vandewalle, René Govaerts, W. De Becker, Marc Decroos, G. Speybrouck. 43-49 [doi]
- Cryptanalysis of the Dickson SchemeWinfried B. Müller, Rupert Nöbauer. 50-61 [doi]
- Simultaneous Security of Bits in the Discrete LogRené Peralta. 62-72 [doi]
- On Public-Key Cryptosystems Built using Polynomial RingsJosef Pieprzyk. 73-78 [doi]
- Is the Data Encryption Standard a Group? (Preliminary Abstract)Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman. 81-95 [doi]
- Cryptanalysts Representation of Nonlinearly Filtered ML-SequencesThomas Siegenthaler. 103-110 [doi]
- Authorized Writing for Write-Once MemoriesPhilippe Godlewski, Gérard D. Cohen. 111-115 [doi]
- On Functions of Linear Shift Register SequencesTore Herlestam. 119-129 [doi]
- On Feedforward Transforms and p-Fold Periodic p-ArraysDong-sheng Chen, Zong-Duo Dai. 130-134 [doi]
- Generalized Multiplexed SequencesMulan Liu, Zhe-xian Wan. 135-141 [doi]
- A Note On Sequences Generated by Clock Controlled Shift RegistersBernhard Smeets. 142-148 [doi]
- Using Algorithms as Keys in Stream CiphersNeal R. Wagner, Paul Putter, Marianne R. Cain. 149-155 [doi]
- On the Linear Complexity of Combined Shift Register SequencesLennart Brynielsson. 156-160 [doi]
- Analysis of a Nonlinear Feedforward Logic for Binary Sequence GeneratorsJ. Bernasconi, C. G. Günther. 161-166 [doi]
- Linear Complexity and Random SequencesRainer A. Rueppel. 167-188 [doi]
- Engineering Secure Information SystemsDonald W. Davies, Wyn L. Price. 191-199 [doi]
- The Chipcard: An Identification Card With Cryptographic ProtectionThomas Krivachy. 200-207 [doi]
- The Role of Encipherment Services in Distributed SystemsR. W. Jones, M. S. J. Baxter. 214-220 [doi]
- Modelling of Encryption Techniques for Secrecy and Privacy in Multi-User NetworksGordon B. Agnew. 221-230 [doi]
- Full Encryption in a Personal Computer SystemRobert L. Bradey, Ian G. Graham. 231-240 [doi]
- Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable PseudonymsDavid Chaum. 241-244 [doi]
- Networks Without User Observability: Design OptionsAndreas Pfitzmann, Michael Waidner. 245-253 [doi]
- The Verifiability of Two-Party ProtocolsRonald V. Book, Friedrich Otto. 254-260 [doi]
- The Practice of AuthenticationGustavus J. Simmons. 261-272 [doi]
- Message Protection by Spread Spectrum Modulation in a Packet Voice Radio LinkM. Kowatsch, B. O. Eichinger, F. J. Seifert. 273-277 [doi]