Advances in Cryptology ¿ CRYPTO ¿91
Proceedings
Herausgegeben:Feigenbaum, Joan
Advances in Cryptology ¿ CRYPTO ¿91
Proceedings
Herausgegeben:Feigenbaum, Joan
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Crypto '91 was the eleventh in a series of workshops on cryptology sponsoredby the International Association for Cryptologic Research and was held in Santa Barbara, California, in August 1991. This volume contains a full paper or an extended abstract for each of the 39 talks presented at the workshop. All theoretical and practical aspects of cryptology are represented, including: protocol design and analysis, combinatorics and authentication, secret sharing and information theory, cryptanalysis, complexity theory, cryptographic schemas based on number theory, pseudorandomness, applications and…mehr
Andere Kunden interessierten sich auch für
- Advances in Cryptology - CRYPTO '9042,99 €
- Advances in Cryptology ¿ CRYPTO ¿9642,99 €
- Joe Kilian (ed.)Advances in Cryptology - CRYPTO 200183,99 €
- Colin Boyd (ed.)Advances in Cryptology ¿ ASIACRYPT 200142,99 €
- Peng Ning / Sihan Qing / Ninghui Li (eds.)Information and Communications Security83,99 €
- Advances in Cryptology ¿ CRYPTO ¿9542,99 €
- Moti Yung (ed.)Advances in Cryptology - CRYPTO 200283,99 €
-
-
-
Crypto '91 was the eleventh in a series of workshops on
cryptology sponsoredby the International Association for
Cryptologic Research and was held in Santa Barbara,
California, in August 1991.
This volume contains a full paper or an extended abstract
for each of the 39 talks presented at the workshop. All
theoretical and practical aspects of cryptology are
represented, including: protocol design and analysis,
combinatorics and authentication, secret sharing and
information theory, cryptanalysis, complexity theory,
cryptographic schemas based on number theory,
pseudorandomness, applications and implementations, viruses,
public-key cryptosystems, and digital signatures.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
cryptology sponsoredby the International Association for
Cryptologic Research and was held in Santa Barbara,
California, in August 1991.
This volume contains a full paper or an extended abstract
for each of the 39 talks presented at the workshop. All
theoretical and practical aspects of cryptology are
represented, including: protocol design and analysis,
combinatorics and authentication, secret sharing and
information theory, cryptanalysis, complexity theory,
cryptographic schemas based on number theory,
pseudorandomness, applications and implementations, viruses,
public-key cryptosystems, and digital signatures.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 576
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-540-55188-1
- 1992
- Seitenzahl: 496
- Erscheinungstermin: 26. Februar 1992
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 820g
- ISBN-13: 9783540551881
- ISBN-10: 3540551883
- Artikelnr.: 27191717
- Lecture Notes in Computer Science 576
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-540-55188-1
- 1992
- Seitenzahl: 496
- Erscheinungstermin: 26. Februar 1992
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 820g
- ISBN-13: 9783540551881
- ISBN-10: 3540551883
- Artikelnr.: 27191717
Protocol Design and Analysis.- A Calculus for Access Control in Distributed Systems.- Deriving the Complete Knowledge of Participants in Cryptographic Protocols.- Systematic Design of Two-Party Authentication Protocols.- Combinatorics and Authentication.- Combinatorial characterizations of authentication codes.- Universal hashing and authentication codes.- On Correlation-immune functions.- Secret Sharing and Information Theory.- On the Size of Shares for Secret Sharing Schemes.- On Verification in Secret Sharing.- Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.- Multiparty Secret Key Exchange Using a Random Deal of Cards.- Cryptanalysis.- Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.- A Known Plaintext Attack of FEAL-4 and FEAL-6.- A switching closure test to analyze cryptosystems.- An Attack on the Last Two Rounds of MD4.- The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks.- Complexity Theory.- A One-Round, Two-Prover, Zero-Knowledge Protocol for NP.- Interactive Proofs with Space Bounded Provers.- Functional Inversion and Communication Complexity.- The Use of Interaction in Public Cryptosystems..- Cryptographic Schemes Based on Number Theory.- New Public-Key Schemes Based on Elliptic Curves over the Ring Zn.- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems.- CM-Curves with Good Cryptographic Properties.- A New ID-Based Key Sharing System.- Pseudorandomness.- Pseudo-random Generators from One-way Functions.- New Results on Pseudorandom Permutation Generators Based on the Des Scheme.- Applications and Implementations.- Faster Modular Multiplication by Operand Scaling.- Universal Electronic Cash.- How to Break and Repair a "Provably Secure" Untraceable PaymentSystem.- Practical Quantum Oblivious Transfer.- Exploiting Parallelism in Hardware Implementation of the DES.- Secure Computation Protocols.- Foundations of Secure Interactive Computing.- Secure Computation.- A Cryptographic Scheme for Computerized General Elections.- Efficient Multiparty Protocols Using Circuit Randomization.- Public-Key Cryptosystems and Signatures.- Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks.- Shared generation of authenticators and signatures.- Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.
Protocol Design and Analysis.- A Calculus for Access Control in Distributed Systems.- Deriving the Complete Knowledge of Participants in Cryptographic Protocols.- Systematic Design of Two-Party Authentication Protocols.- Combinatorics and Authentication.- Combinatorial characterizations of authentication codes.- Universal hashing and authentication codes.- On Correlation-immune functions.- Secret Sharing and Information Theory.- On the Size of Shares for Secret Sharing Schemes.- On Verification in Secret Sharing.- Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.- Multiparty Secret Key Exchange Using a Random Deal of Cards.- Cryptanalysis.- Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.- A Known Plaintext Attack of FEAL-4 and FEAL-6.- A switching closure test to analyze cryptosystems.- An Attack on the Last Two Rounds of MD4.- The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks.- Complexity Theory.- A One-Round, Two-Prover, Zero-Knowledge Protocol for NP.- Interactive Proofs with Space Bounded Provers.- Functional Inversion and Communication Complexity.- The Use of Interaction in Public Cryptosystems..- Cryptographic Schemes Based on Number Theory.- New Public-Key Schemes Based on Elliptic Curves over the Ring Zn.- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems.- CM-Curves with Good Cryptographic Properties.- A New ID-Based Key Sharing System.- Pseudorandomness.- Pseudo-random Generators from One-way Functions.- New Results on Pseudorandom Permutation Generators Based on the Des Scheme.- Applications and Implementations.- Faster Modular Multiplication by Operand Scaling.- Universal Electronic Cash.- How to Break and Repair a "Provably Secure" Untraceable PaymentSystem.- Practical Quantum Oblivious Transfer.- Exploiting Parallelism in Hardware Implementation of the DES.- Secure Computation Protocols.- Foundations of Secure Interactive Computing.- Secure Computation.- A Cryptographic Scheme for Computerized General Elections.- Efficient Multiparty Protocols Using Circuit Randomization.- Public-Key Cryptosystems and Signatures.- Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks.- Shared generation of authenticators and signatures.- Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.