Abstract is missing.
- Some Preliminary Remarks on the Decimal, Shift an Add-Algorithm (DSA)F.-P. Heider, D. Kraus, M. Welschenbach. 3
- Protection Against Active EavesdroppingCees J. A. Jansen. 4-6
- The Need for a Standarized Compression Algorithm for Digital SignaturesDenis Pinkas. 7
- Could the Smart Card Be DumbA. S. Glass. 8
- The NPL Intelligent Token and its ApplicationWyn L. Price. 10-13
- Activities of IFIP Working Group 11: 4 on Crypto ManagementViiveke Fåk. 14
- A Simple an Fast Probabilistic Algorithm for Computing Square Roots Modulo a Prime NumberRené Peralta, Jeroen van de Graaf. 15
- Cycle Structure of the Weak and Semi-Weak DES KeysJudy H. Moore, Gustavus J. Simmons. 16
- Several Exhaustive Key Search Machines and DESYvo Desmedt, Frank Hoornaert, Jean-Jacques Quisquater. 17-19
- Additional Properties in the S-Boxes of the DESHenri Cloetens, Yvo Desmedt, Luc Bierens, Joos Vandewalle, René Govaerts. 20
- Cryptanalysis of the Yagisawa Public Key CryptosystemErnest F. Brickell. 21-22
- Cryptanalysis of Pseudo-Random Number Sequences Generated by a Linear Recurrence of a Given OrderAnne Bauval. 23-26
- A Cryptanalytic Attack on the CADE CryptosystemN. S. James, Rudolf Lidl, Harald Niederreiter. 27
- Sharma-Mittal Entropy and Shannon s Random Cipher ResultGur Dial, Franquiberto Pessoa. 28
- Another Look at Redundancy in Cryptographic SystemsGordon B. Agnew. 29
- Products of Linear Recurring Sequence with Maximum ComplexityRainer A. Rueppel, Othmar Staffelbach. 30-32
- Linear Complexity of Sequences with Period p:::n:::Dieter Gollmann. 33
- Elementary Proof of Rueppel s Linear Complexity ConjectureNguyen Quang A. 34
- The Characterization of All Binary Sequences with Perfect Linear Complexity ProfilesMuzhong Wang, James L. Massey. 35-36
- Some Properties of Sequences Generated by a Windmill MachineBernhard Smeets. 37
- On Linear Shift Registers with Permuted FeedbackTore Herlestam. 38-39
- On Some Properties of the Sum of Two Pseudorandom SequencesC. G. Günther. 40-41
- Correlation-Immune Polynomials over Finite FieldsThomas Siegenthaler. 42
- On the Walsh-Fourier Analysis of Correlation-Immune Switching FunctionsFranz Pichler. 43-44
- Properties of De Bruijn Sequences Generated by a Cross-Join TechniqueMaurice Beale. 45
- Geometric Structures as Threshold SchemesAlbrecht Beutelspacher. 46
- Tactical Configurations and Threshold SchemesA. Ecker. 47
- Analyzing Encryption Protocols Using Formal Verification TechniquesRichard A. Kemmerer. 48
- Controlling Individual Information in Statistics by CodingOve Frank, Per Weidenman. 49
- Multilevel Cryptosecure Relational DatabaseGeorge I. Davida, Yi-Shiung Yeh. 50
- On Commutative Semigroups of Polynomials and their Application in CryptographyWinfried B. Müller, Rupert Nöbauer. 50
- Public Key Encryption of Stream CiphersD. D. Buckley, Maurice Beale. 53-54
- Encryption Exponent 3 and the Security of RSADavid S. P. Khoo, Gregory J. Bird, Jennifer Seberry. 55