HOME > 상세정보

상세정보

Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings

Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings

자료유형
단행본
개인저자
Seberry, Jennifer, 1944-. Pieprzyk, Josef, 1949-.
단체저자명
International Association for Cryptologic Research.
서명 / 저자사항
Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / J. Seberry, J. Pieprzyk, eds.
발행사항
Berlin ;   New York :   Springer-Verlag,   c1990.  
형태사항
ix, 462 p. : ill. ; 25 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 453
ISBN
3540530002 (Berlin : alk. paper) 9783540530008 (Berlin : alk. paper) 0387530002 (New York : alk. paper) 9780387530000 (New York : alk. paper)
일반주기
Sponsored by the International Association for Cryptologic Research.  
서지주기
Includes bibliographical references.
일반주제명
Computer security -- Congresses. Cryptography -- Congresses.
000 01728camuu2200409 a 4500
001 000000901612
005 20091120162324
008 900803s1990 gw a b 100 0 eng
010 ▼a 90010201
020 ▼a 3540530002 (Berlin : alk. paper)
020 ▼a 9783540530008 (Berlin : alk. paper)
020 ▼a 0387530002 (New York : alk. paper)
020 ▼a 9780387530000 (New York : alk. paper)
035 ▼a (OCoLC)ocm22243438
035 ▼a (OCoLC)22243438
035 ▼a (KERIS)REF000013778922
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
049 0 ▼l 452076103 ▼v 453
050 0 0 ▼a QA76.9.A25 ▼b A87 1990
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b A932a ▼c 1990
111 2 ▼a AUSCRYPT '90 ▼d (1990 : ▼c University of New South Wales)
245 1 0 ▼a Advances in cryptology--AUSCRYPT '90 : ▼b international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / ▼c J. Seberry, J. Pieprzyk, eds.
246 3 0 ▼a AUSCRYPT '90
260 ▼a Berlin ; ▼a New York : ▼b Springer-Verlag, ▼c c1990.
300 ▼a ix, 462 p. : ▼b ill. ; ▼c 25 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 453
500 ▼a Sponsored by the International Association for Cryptologic Research.
504 ▼a Includes bibliographical references.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Seberry, Jennifer, ▼d 1944-.
700 1 ▼a Pieprzyk, Josef, ▼d 1949-.
710 2 ▼a International Association for Cryptologic Research.
830 0 ▼a Lecture notes in computer science ; ▼v 453.

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 A932a 1990 등록번호 121186568 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 세종학술정보원/과학기술실/ 청구기호 005.82 A932a 1990 등록번호 452076103 도서상태 대출가능 반납예정일 예약 서비스
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 A932a 1990 등록번호 121186568 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실/ 청구기호 005.82 A932a 1990 등록번호 452076103 도서상태 대출가능 반납예정일 예약 서비스

컨텐츠정보

목차

The implementation of elliptic curve cryptosystems.- Direct demonstration of the power to break public-key cryptosystems.- Continued fractions and the Berlekamp-Massey algorithm.- Nonlinear generators of binary sequences with controllable complexity and double key.- K-M sequence is forwardly predictable.- Lower bounds on the weight complexities of cascaded binary sequences.- Secure user access control for public networks.- Formal specification and verification of secure communication protocols.- Network security policy models.- KEYMEX: An expert system for the design of key management schemes.- On the formal analysis of PKCS authentication protocols.- Some remarks on authentication systems.- Meet-in-the-middle attack on digital signature schemes.- A binary sequence generator based on Ziv-Lempel source coding.- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence.- Parallel generation of pseudo-random sequences.- Large primes in stream cipher cryptography.- Comparison of block ciphers.- Key scheduling in des type cryptosystems.- LOKI - A cryptographic primitive for authentication and secrecy applications.- Permutation generators of alternating groups.- Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms.- A (non-practical) three-pass identification protocol using coding theory.- Demonstrating possession without revealing factors and its application.- Anonymous one-time signatures and flexible untraceable electronic cash.- Dyadic matrices and their potential significance in cryptography (abstract).- A note on strong Fibonacci pseudoprimes.- On the significance of the directed acyclic word graph in cryptology.- Solving equations in sequences.- The practical application of state of the art security in real environments.- RSA as a benchmark for multiprocessor machines.- Range equations and range matrices: a study in statistical database security.- Record encryption in distributed databases.- VLSI design for exponentiation in GF(2n).- A fast modular-multiplication module for smart cards.- Minos: Extended user authentication.- Universal logic sequences.- The three faces of information security.- Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system.


정보제공 : Aladin

관련분야 신착자료