Research Catalog
Advances in cryptology--CRYPTO '91 : proceedings
- Title
- Advances in cryptology--CRYPTO '91 : proceedings / J. Feigenbaum (ed.).
- Author
- CRYPTO (Conference) (1991 : University of California, Santa Barbara)
- Publication
- Berlin ; New York : Springer-Verlag, ©1992.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Use in library | QA76.9.A25 C79 1991 | Off-site |
Details
- Additional Authors
- Feigenbaum, Joan, 1958-
- Description
- x, 484 pages : illustrations; 25 cm.
- Series Statement
- Lecture notes in computer science ; 576
- Uniform Title
- Lecture notes in computer science ; 576.
- Subject
- Genre/Form
- Conference papers and proceedings
- Note
- Conference held Aug. 11-15, 1991, at the University of California, Santa Barbara.
- Includes index.
- Bibliography (note)
- Includes bibliographical references and index.
- Additional Formats (note)
- Also available in an electronic version.
- Contents
- Protocol Design and Analysis -- A Calculus for Access Control in Distributed Systems -- Deriving the Complete Knowledge of Participants in Cryptographic Protocols -- Systematic Design of Two-Party Authentication Protocols -- Combinatorics and Authentication -- Combinatorial characterizations of authentication codes -- Universal hashing and authentication codes -- On Correlation-immune functions -- Secret Sharing and Information Theory -- On the Size of Shares for Secret Sharing Schemes -- On Verification in Secret Sharing -- Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing -- Multiparty Secret Key Exchange Using a Random Deal of Cards -- Cryptanalysis -- Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer -- A Known Plaintext Attack of FEAL-4 and FEAL-6 -- A switching closure test to analyze cryptosystems -- An Attack on the Last Two Rounds of MD4 -- The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks -- Complexity Theory -- A One-Round, Two-Prover, Zero-Knowledge Protocol for NP -- Interactive Proofs with Space Bounded Provers -- Functional Inversion and Communication Complexity -- The Use of Interaction in Public Cryptosystems. -- Cryptographic Schemes Based on Number Theory -- New Public-Key Schemes Based on Elliptic Curves over the Ring Zn -- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems -- CM-Curves with Good Cryptographic Properties -- A New ID-Based Key Sharing System -- Pseudorandomness -- Pseudo-random Generators from One-way Functions -- New Results on Pseudorandom Permutation Generators Based on the Des Scheme -- Applications and Implementations -- Faster Modular Multiplication by Operand Scaling -- Universal Electronic Cash -- How to Break and Repair a "Provably Secure" Untraceable Payment System -- Practical Quantum Oblivious Transfer -- Exploiting Parallelism in Hardware Implementation of the DES -- Secure Computation Protocols -- Foundations of Secure Interactive Computing -- Secure Computation -- A Cryptographic Scheme for Computerized General Elections -- Efficient Multiparty Protocols Using Circuit Randomization -- Public-Key Cryptosystems and Signatures -- Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack -- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks -- Shared generation of authenticators and signatures -- Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.
- ISBN
- 0387551883
- 9780387551883
- 3540551883
- 9783540551881
- LCCN
- 91048169
- OCLC
- ocm25164016
- 25164016
- SCSB-1940582
- Owning Institutions
- Princeton University Library