Advances in Cryptology ¿ CRYPTO ¿91
Proceedings
Herausgegeben:Feigenbaum, Joan
Advances in Cryptology ¿ CRYPTO ¿91
Proceedings
Herausgegeben:Feigenbaum, Joan
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Crypto '91 was the eleventh in a series of workshops on cryptology sponsoredby the International Association for Cryptologic Research and was held in Santa Barbara, California, in August 1991. This volume contains a full paper or an extended abstract for each of the 39 talks presented at the workshop. All theoretical and practical aspects of cryptology are represented, including: protocol design and analysis, combinatorics and authentication, secret sharing and information theory, cryptanalysis, complexity theory, cryptographic schemas based on number theory, pseudorandomness, applications and…mehr
Andere Kunden interessierten sich auch für
- Advances in Cryptology - CRYPTO '9040,99 €
- Joe Kilian (ed.)Advances in Cryptology - CRYPTO 200179,99 €
- Advances in Cryptology ¿ CRYPTO ¿9640,99 €
- Information Security and Privacy73,99 €
- Advances in Cryptology ¿ ASIACRYPT¿9839,99 €
- Security Protocols40,99 €
- Code-Based Cryptography37,99 €
-
-
-
Crypto '91 was the eleventh in a series of workshops on
cryptology sponsoredby the International Association for
Cryptologic Research and was held in Santa Barbara,
California, in August 1991.
This volume contains a full paper or an extended abstract
for each of the 39 talks presented at the workshop. All
theoretical and practical aspects of cryptology are
represented, including: protocol design and analysis,
combinatorics and authentication, secret sharing and
information theory, cryptanalysis, complexity theory,
cryptographic schemas based on number theory,
pseudorandomness, applications and implementations, viruses,
public-key cryptosystems, and digital signatures.
cryptology sponsoredby the International Association for
Cryptologic Research and was held in Santa Barbara,
California, in August 1991.
This volume contains a full paper or an extended abstract
for each of the 39 talks presented at the workshop. All
theoretical and practical aspects of cryptology are
represented, including: protocol design and analysis,
combinatorics and authentication, secret sharing and
information theory, cryptanalysis, complexity theory,
cryptographic schemas based on number theory,
pseudorandomness, applications and implementations, viruses,
public-key cryptosystems, and digital signatures.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 576
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-540-55188-1
- 1992
- Seitenzahl: 496
- Erscheinungstermin: 26. Februar 1992
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 820g
- ISBN-13: 9783540551881
- ISBN-10: 3540551883
- Artikelnr.: 27191717
- Lecture Notes in Computer Science 576
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-540-55188-1
- 1992
- Seitenzahl: 496
- Erscheinungstermin: 26. Februar 1992
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 820g
- ISBN-13: 9783540551881
- ISBN-10: 3540551883
- Artikelnr.: 27191717
Protocol Design and Analysis.- A Calculus for Access Control in Distributed Systems.- Deriving the Complete Knowledge of Participants in Cryptographic Protocols.- Systematic Design of Two-Party Authentication Protocols.- Combinatorics and Authentication.- Combinatorial characterizations of authentication codes.- Universal hashing and authentication codes.- On Correlation-immune functions.- Secret Sharing and Information Theory.- On the Size of Shares for Secret Sharing Schemes.- On Verification in Secret Sharing.- Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.- Multiparty Secret Key Exchange Using a Random Deal of Cards.- Cryptanalysis.- Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.- A Known Plaintext Attack of FEAL-4 and FEAL-6.- A switching closure test to analyze cryptosystems.- An Attack on the Last Two Rounds of MD4.- The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks.- Complexity Theory.- A One-Round, Two-Prover, Zero-Knowledge Protocol for NP.- Interactive Proofs with Space Bounded Provers.- Functional Inversion and Communication Complexity.- The Use of Interaction in Public Cryptosystems..- Cryptographic Schemes Based on Number Theory.- New Public-Key Schemes Based on Elliptic Curves over the Ring Zn.- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems.- CM-Curves with Good Cryptographic Properties.- A New ID-Based Key Sharing System.- Pseudorandomness.- Pseudo-random Generators from One-way Functions.- New Results on Pseudorandom Permutation Generators Based on the Des Scheme.- Applications and Implementations.- Faster Modular Multiplication by Operand Scaling.- Universal Electronic Cash.- How to Break and Repair a "Provably Secure" Untraceable PaymentSystem.- Practical Quantum Oblivious Transfer.- Exploiting Parallelism in Hardware Implementation of the DES.- Secure Computation Protocols.- Foundations of Secure Interactive Computing.- Secure Computation.- A Cryptographic Scheme for Computerized General Elections.- Efficient Multiparty Protocols Using Circuit Randomization.- Public-Key Cryptosystems and Signatures.- Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks.- Shared generation of authenticators and signatures.- Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.
Protocol Design and Analysis.- A Calculus for Access Control in Distributed Systems.- Deriving the Complete Knowledge of Participants in Cryptographic Protocols.- Systematic Design of Two-Party Authentication Protocols.- Combinatorics and Authentication.- Combinatorial characterizations of authentication codes.- Universal hashing and authentication codes.- On Correlation-immune functions.- Secret Sharing and Information Theory.- On the Size of Shares for Secret Sharing Schemes.- On Verification in Secret Sharing.- Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.- Multiparty Secret Key Exchange Using a Random Deal of Cards.- Cryptanalysis.- Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.- A Known Plaintext Attack of FEAL-4 and FEAL-6.- A switching closure test to analyze cryptosystems.- An Attack on the Last Two Rounds of MD4.- The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks.- Complexity Theory.- A One-Round, Two-Prover, Zero-Knowledge Protocol for NP.- Interactive Proofs with Space Bounded Provers.- Functional Inversion and Communication Complexity.- The Use of Interaction in Public Cryptosystems..- Cryptographic Schemes Based on Number Theory.- New Public-Key Schemes Based on Elliptic Curves over the Ring Zn.- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems.- CM-Curves with Good Cryptographic Properties.- A New ID-Based Key Sharing System.- Pseudorandomness.- Pseudo-random Generators from One-way Functions.- New Results on Pseudorandom Permutation Generators Based on the Des Scheme.- Applications and Implementations.- Faster Modular Multiplication by Operand Scaling.- Universal Electronic Cash.- How to Break and Repair a "Provably Secure" Untraceable PaymentSystem.- Practical Quantum Oblivious Transfer.- Exploiting Parallelism in Hardware Implementation of the DES.- Secure Computation Protocols.- Foundations of Secure Interactive Computing.- Secure Computation.- A Cryptographic Scheme for Computerized General Elections.- Efficient Multiparty Protocols Using Circuit Randomization.- Public-Key Cryptosystems and Signatures.- Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks.- Shared generation of authenticators and signatures.- Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.