Research Catalog
Cryptography : policy and algorithms : international conference, Brisbane, Queensland, Australia, July 3-5, 1995 : proceedings
- Title
- Cryptography : policy and algorithms : international conference, Brisbane, Queensland, Australia, July 3-5, 1995 : proceedings / Ed Dawson, Jovan Gović, eds.
- Publication
- Berlin ; New York : Springer, 1996.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Request in advance | QA76.9.A25 C844 1996 | Off-site |
Holdings
Details
- Additional Authors
- Description
- xi, 325 pages : illustrations; 23 cm.
- Series Statement
- Lecture notes in computer science ; 1029
- Uniform Title
- Lecture notes in computer science ; 1029.
- Subject
- Bibliography (note)
- Includes bibliographical references and index.
- Contents
- Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement? / William Caelli -- Privacy and Security Policy Choices in an NII Environment / Willis Ware -- Commercial Key Escrow: An Australian Perspective / William Caelli -- Encryption and the Global Information Infrastructure: An Australian Perspective / Steve Orlowski -- Crypto in Europe - Markets, Law and Policy / Ross Anderson -- Saving Dollars Makes Sense of Crypto Export Controls / Mark Ames -- A Proposed Architecture for Trusted Third Party Services / Nigel Jefferies, Chris Mitchell and Michael Walker -- A New Key Escrow Cryptosystem / Jingmin He and Ed Dawson -- How to Fairly Reconstruct a Shared Secret / Jingmin He and Ed Dawson -- A Note on Nonuniform Decimation of Periodic Sequences / Jovan Dj Golic -- Randomness Measures Related to Subset Occurrence / Helen Gustafson, Ed Dawson and Jovan Dj Golic -- Low Order Approximation of Cipher Functions / William Millan --
- Multiple Encryption with Minimum Key / Ivan B. Damgard and Lars R. Knudsen -- A One-Key Cryptosystem Based on a Finite Nonlinear Automaton / Marc Gysin -- A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps / Jovan Dj Golic and Luke O'Connor -- Discrete Optimisation and Fast Correlation Attacks / Jovan Dj Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar and Ed Dawson -- Keyed Hash Functions / Shahram Bakhtiari, Rei Safavi-Naini and Josef Pieprzyk -- Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation / Shin-Jia Hwang, Chin-Chen Chang and Wei-Pang Yang -- Cryptanalysis of the Enhanced ElGamal's Signature Scheme / Chi-Sung Laih and Wen-Chung Kuo -- Access with Pseudonyms / Lidong Chen -- A New Identification Algorithm / Kefei Chen -- Public-key Cryptography on Smart Cards / Andreas Fuchsberger, Dieter Gollmann, Paul Lothian, Kenneth G. Paterson and Abraham Sidiropoulos --
- Integrating Smart Cards Into Authentication Systems / Gary Gaskell and Mark Looi -- Smart Card with Interferometric Quantum Cryptography Device / Jaroslav Hruby -- Cryptographic APIs / Dieter Gollmann -- Foiling Active Network Impersonation Attacks Made in Collusion with an Insider / Selwyn Russell -- The CASS Shell / George Mohay, Hasmukh Morarji, Q. Le-Viet, Lance Munday and William Caelli.
- ISBN
- 3540607595 (softcover : alk. paper)
- LCCN
- 95051353
- OCLC
- ocm33971937
- Owning Institutions
- Columbia University Libraries