03302nam 2200553 450 99646580600331620211205191550.03-540-39466-410.1007/3-540-39466-4(CKB)1000000000210858(SSID)ssj0000322396(PQKBManifestationID)11268114(PQKBTitleCode)TC0000322396(PQKBWorkID)10286912(PQKB)10743971(DE-He213)978-3-540-39466-2(MiAaPQ)EBC3072883(MiAaPQ)EBC6574572(Au-PeEL)EBL6574572(OCoLC)1256262719(PPN)155236822(EXLCZ)99100000000021085820211205d1983 uy 0engurnn|008mamaatxtccrCryptography proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29-April 2, 1982 /edited by Thomas Beth1st ed. 1983.Berlin ;Heidelberg ;New York :Springer-Verlag,1983.1 online resource (VIII, 402 p.) Lecture Notes in Computer Science,0302-9743 ;149Bibliographic Level Mode of Issuance: Monograph3-540-11993-0 Includes bibliographical references.Classical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices -- Cryptanalysis of a Kryha Machine -- Enigma Variations -- Mathematical Foundations -- Encrypting by Random Rotations -- Analogue Scrambling Schemes -- Analogue Speech Security Systems -- A Voice Scrambling System for Testing and Demonstration -- The Rating of Understanding in Secure Voice Communications Systems -- Analysis of Multiple Access Channel Using Multiple Level FSK -- Analog Scrambling by the General Fast Fourier Transform -- Stream Ciphers -- Stream Ciphers -- Multiplexed Sequences: Some Properties of the Minimum Polynomial -- On Using Prime Polynomials in Crypto Generators -- Cryptography in Large communication Systems -- Communication Security in Remote Controlled Computer Systems -- Privacy and Data Protection in Medicine -- The Data Encryption Standard -- Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding -- Are Big S-Boxes Best? -- The Average Cycle Size of The Key Stream in Output Feedback Encipherment -- Authentication Systems -- Authentication Procedures -- Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem -- The Merkle — Hellman — Scheme -- A New Algorithm for the Solution of the Knapsack Problem -- Trapdoors in Knapsack Kryptosystems -- The Rivest - Shamir - Adleman - Scheme -- Is the RSA - Scheme safe? (Abstract) -- Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract) -- Finite Semigroups and The RSA-Cryptosystem -- How to Share a Secret.Lecture Notes in Computer Science,0302-9743 ;149CryptographyCongressesCryptography001.5436Beth Thomas1949-MiAaPQMiAaPQMiAaPQBOOK996465806003316Cryptography229794UNISA01176oam 2200397zu 450 991087276220332120241212214819.010.1109/RAMS.1995(CKB)111026746711582(SSID)ssj0000455405(PQKBManifestationID)12149198(PQKBTitleCode)TC0000455405(PQKBWorkID)10399798(PQKB)10937040(NjHacI)99111026746711582(EXLCZ)9911102674671158220160829d1995 uy engur|||||||||||txtccr1995 Annual Reliability and Maintainability Symposium[Place of publication not identified]IEEE19951 online resource (652 pages)Bibliographic Level Mode of Issuance: Monograph9780780324701 0780324706 Maintainability (Engineering)Maintainability (Engineering)620.0045PQKBBOOK99108727622033211995 Annual Reliability and Maintainability Symposium2504919UNINA