Research Catalog

Advances in cryptology--CRYPTO '91 : proceedings

Title
Advances in cryptology--CRYPTO '91 : proceedings / J. Feigenbaum (ed.).
Author
CRYPTO (Conference) (1991 : University of California, Santa Barbara)
Publication
Berlin ; New York : Springer-Verlag, ©1992.

Items in the Library & Off-site

Filter by

1 Item

StatusFormatAccessCall NumberItem Location
TextUse in library QA76.9.A25 C79 1991Off-site

Details

Additional Authors
Feigenbaum, Joan, 1958-
Description
x, 484 pages : illustrations; 25 cm.
Series Statement
Lecture notes in computer science ; 576
Uniform Title
Lecture notes in computer science ; 576.
Subject
  • Computers > Access control > Congresses
  • Cryptography > Congresses
  • Computers > Access control
  • Cryptography
  • Kryptologie
  • Cryptographie > Congrès
  • Santa Barbara <Calif., 1991>
Genre/Form
Conference papers and proceedings
Note
  • Conference held Aug. 11-15, 1991, at the University of California, Santa Barbara.
  • Includes index.
Bibliography (note)
  • Includes bibliographical references and index.
Additional Formats (note)
  • Also available in an electronic version.
Contents
Protocol Design and Analysis -- A Calculus for Access Control in Distributed Systems -- Deriving the Complete Knowledge of Participants in Cryptographic Protocols -- Systematic Design of Two-Party Authentication Protocols -- Combinatorics and Authentication -- Combinatorial characterizations of authentication codes -- Universal hashing and authentication codes -- On Correlation-immune functions -- Secret Sharing and Information Theory -- On the Size of Shares for Secret Sharing Schemes -- On Verification in Secret Sharing -- Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing -- Multiparty Secret Key Exchange Using a Random Deal of Cards -- Cryptanalysis -- Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer -- A Known Plaintext Attack of FEAL-4 and FEAL-6 -- A switching closure test to analyze cryptosystems -- An Attack on the Last Two Rounds of MD4 -- The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks -- Complexity Theory -- A One-Round, Two-Prover, Zero-Knowledge Protocol for NP -- Interactive Proofs with Space Bounded Provers -- Functional Inversion and Communication Complexity -- The Use of Interaction in Public Cryptosystems. -- Cryptographic Schemes Based on Number Theory -- New Public-Key Schemes Based on Elliptic Curves over the Ring Zn -- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems -- CM-Curves with Good Cryptographic Properties -- A New ID-Based Key Sharing System -- Pseudorandomness -- Pseudo-random Generators from One-way Functions -- New Results on Pseudorandom Permutation Generators Based on the Des Scheme -- Applications and Implementations -- Faster Modular Multiplication by Operand Scaling -- Universal Electronic Cash -- How to Break and Repair a "Provably Secure" Untraceable Payment System -- Practical Quantum Oblivious Transfer -- Exploiting Parallelism in Hardware Implementation of the DES -- Secure Computation Protocols -- Foundations of Secure Interactive Computing -- Secure Computation -- A Cryptographic Scheme for Computerized General Elections -- Efficient Multiparty Protocols Using Circuit Randomization -- Public-Key Cryptosystems and Signatures -- Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack -- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks -- Shared generation of authenticators and signatures -- Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.
ISBN
  • 0387551883
  • 9780387551883
  • 3540551883
  • 9783540551881
LCCN
91048169
OCLC
  • ocm25164016
  • 25164016
  • SCSB-1940582
Owning Institutions
Princeton University Library