Abstract is missing.
- In Memoriam Tore Herlestam (1929 - 1986)James L. Massey. 3-4 [doi]
- Alternating Step Generators Controlled by De Bruijn SequencesC. G. Günther. 5-14 [doi]
- Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel DistributionThomas Siegenthaler, Amstein Walthert Kleiner, Réjane Forré. 15-23 [doi]
- Some Remarks on the Cross Correlation Analysis of Pseudo Random GeneratorsSibylle Mund, Dieter Gollmann, Thomas Beth. 25-35 [doi]
- Sequences With Almost Perfect Linear Complexity ProfileHarald Niederreiter. 37-51 [doi]
- When Shift Registers Clock ThemselvesRainer A. Rueppel. 53-64 [doi]
- Finite State Machine Modelling of Cryptographic Systems in LoopsFranz Pichler. 65-73 [doi]
- Random Sources for Cryptographic SystemsGordon B. Agnew. 77-81 [doi]
- Physical Protection of Cryptographic DevicesAndrew J. Clark. 83-93 [doi]
- The RSA Cryptography ProcessorHolger Sedlak. 95-105 [doi]
- Extension of Brickell s Algorithm for Breaking High Density KnapsacksF. Jorissen, Joos Vandewalle, René Govaerts. 109-115 [doi]
- On Privacy Homomorphisms (Extended Abstract)Ernest F. Brickell, Yacov Yacobi. 117-125 [doi]
- An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some GeneralizationsDavid Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf. 127-141 [doi]
- A Public Key Analog CryptosystemGeorge I. Davida, Gilbert G. Walter. 143-147 [doi]
- Message Authentication with Arbitration of Transmitter/Receiver DisputesGustavus J. Simmons. 151-165 [doi]
- Perfect and Essentially Perfect Authentication SchemesAlbrecht Beutelspacher. 167-170 [doi]
- Message Authentication and Dynamic PasswordsH. J. Beker, G. M. Cole. 171-175 [doi]
- IC-Cards in High-Security ApplicationsIngrid Schaumüller-Bichl. 177-199 [doi]
- Collision Free Hash Functions and Public Key Signature SchemesIvan Damgård. 203-216 [doi]
- Hash-Functions Using Modulo-N OperationsMarc Girault. 217-226 [doi]
- Blinding for Unanticipated SignaturesDavid Chaum. 227-233 [doi]
- Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear CiphersJames L. Massey, Ueli M. Maurer, Muzhong Wang. 237-247 [doi]
- Linear Structures in BlockciphersJan-Hendrik Evertse. 249-266 [doi]
- Fast Data Encipherment Algorithm FEALAkihiro Shimizu, Shoji Miyaguchi. 267-278 [doi]
- Modes of Blockcipher Algorithms and their Protection Against Active EavesdroppingCees J. A. Jansen, Dick E. Boekee. 281-286 [doi]
- Security Considerations in the Design and Implementation of a new DES chipIngrid Verbauwhede, Frank Hoornaert, Joos Vandewalle, Hugo De Man. 287-300 [doi]
- High-Performance Interface Architectures for Cryptographic HardwareDavid P. Anderson, P. Venkat Rangan. 301-309 [doi]