Research Catalog

Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings

Title
Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / J. Seberry, J. Pieprzyk, eds.
Author
AUSCRYPT (Workshop) (1990 : University of New South Wales)
Publication
Berlin ; New York : Springer-Verlag, ©1990.

Items in the Library & Off-site

Filter by

1 Item

StatusFormatAccessCall NumberItem Location
TextUse in library QA76.9.A25 A87 1990Off-site

Details

Additional Authors
  • Seberry, Jennifer, 1944-
  • Pieprzyk, Josef, 1949-
  • International Association for Cryptologic Research.
Description
ix, 462 p. : ill.; 25 cm.
Summary
"This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology."--PUBLISHER'S WEBSITE.
Series Statement
Lecture notes in computer science ; 453
Uniform Title
Lecture notes in computer science ; 453.
Subject
  • Computer security > Congresses
  • Cryptography > Congresses
  • Computer security
  • Cryptography
  • Computers > Access control > Congresses
  • Cryptographie > Congrès
Genre/Form
Conference papers and proceedings.
Note
  • Sponsored by the International Association for Cryptologic Research.
Bibliography (note)
  • Includes bibliographical references.
Contents
Section 1. Public-key cryptosystems -- section 2. Pseudorandomness and sequences I -- section 3. Network security -- section 4. Authentication -- section 5. Pseudorandomness and sequences II -- section 6. Block ciphers -- section 7. Zero-knowledge protocols -- section 8. Theory -- section 9. Applications -- section 10. Implementations.
ISBN
  • 3540530002
  • 9783540530008
  • 0387530002
  • 9780387530000
LCCN
90010201
OCLC
  • ocm22243438
  • 22243438
  • SCSB-1899107
Owning Institutions
Princeton University Library