Research Catalog

Cryptography : policy and algorithms : international conference, Brisbane, Queensland, Australia, July 3-5, 1995 : proceedings

Title
Cryptography : policy and algorithms : international conference, Brisbane, Queensland, Australia, July 3-5, 1995 : proceedings / Ed Dawson, Jovan Gović, eds.
Publication
Berlin ; New York : Springer, 1996.

Items in the Library & Off-site

Filter by

1 Item

StatusFormatAccessCall NumberItem Location
TextRequest in advance QA76.9.A25 C844 1996Off-site

Holdings

Details

Additional Authors
  • Dawson, Ed (Edward)
  • Golić, Jovan.
Description
xi, 325 pages : illustrations; 23 cm.
Series Statement
Lecture notes in computer science ; 1029
Uniform Title
Lecture notes in computer science ; 1029.
Subject
  • Computer security > Congresses
  • Cryptography > Congresses
Bibliography (note)
  • Includes bibliographical references and index.
Contents
  • Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement? / William Caelli -- Privacy and Security Policy Choices in an NII Environment / Willis Ware -- Commercial Key Escrow: An Australian Perspective / William Caelli -- Encryption and the Global Information Infrastructure: An Australian Perspective / Steve Orlowski -- Crypto in Europe - Markets, Law and Policy / Ross Anderson -- Saving Dollars Makes Sense of Crypto Export Controls / Mark Ames -- A Proposed Architecture for Trusted Third Party Services / Nigel Jefferies, Chris Mitchell and Michael Walker -- A New Key Escrow Cryptosystem / Jingmin He and Ed Dawson -- How to Fairly Reconstruct a Shared Secret / Jingmin He and Ed Dawson -- A Note on Nonuniform Decimation of Periodic Sequences / Jovan Dj Golic -- Randomness Measures Related to Subset Occurrence / Helen Gustafson, Ed Dawson and Jovan Dj Golic -- Low Order Approximation of Cipher Functions / William Millan --
  • Multiple Encryption with Minimum Key / Ivan B. Damgard and Lars R. Knudsen -- A One-Key Cryptosystem Based on a Finite Nonlinear Automaton / Marc Gysin -- A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps / Jovan Dj Golic and Luke O'Connor -- Discrete Optimisation and Fast Correlation Attacks / Jovan Dj Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar and Ed Dawson -- Keyed Hash Functions / Shahram Bakhtiari, Rei Safavi-Naini and Josef Pieprzyk -- Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation / Shin-Jia Hwang, Chin-Chen Chang and Wei-Pang Yang -- Cryptanalysis of the Enhanced ElGamal's Signature Scheme / Chi-Sung Laih and Wen-Chung Kuo -- Access with Pseudonyms / Lidong Chen -- A New Identification Algorithm / Kefei Chen -- Public-key Cryptography on Smart Cards / Andreas Fuchsberger, Dieter Gollmann, Paul Lothian, Kenneth G. Paterson and Abraham Sidiropoulos --
  • Integrating Smart Cards Into Authentication Systems / Gary Gaskell and Mark Looi -- Smart Card with Interferometric Quantum Cryptography Device / Jaroslav Hruby -- Cryptographic APIs / Dieter Gollmann -- Foiling Active Network Impersonation Attacks Made in Collusion with an Insider / Selwyn Russell -- The CASS Shell / George Mohay, Hasmukh Morarji, Q. Le-Viet, Lance Munday and William Caelli.
ISBN
3540607595 (softcover : alk. paper)
LCCN
95051353
OCLC
ocm33971937
Owning Institutions
Columbia University Libraries