HOME > Detail View

Detail View

Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings

Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings

Material type
단행본
Personal Author
Seberry, Jennifer, 1944-. Pieprzyk, Josef, 1949-.
Corporate Author
International Association for Cryptologic Research.
Title Statement
Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / J. Seberry, J. Pieprzyk, eds.
Publication, Distribution, etc
Berlin ;   New York :   Springer-Verlag,   c1990.  
Physical Medium
ix, 462 p. : ill. ; 25 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 453
ISBN
3540530002 (Berlin : alk. paper) 9783540530008 (Berlin : alk. paper) 0387530002 (New York : alk. paper) 9780387530000 (New York : alk. paper)
General Note
Sponsored by the International Association for Cryptologic Research.  
Bibliography, Etc. Note
Includes bibliographical references.
Subject Added Entry-Topical Term
Computer security -- Congresses. Cryptography -- Congresses.
000 01728camuu2200409 a 4500
001 000000901612
005 20091120162324
008 900803s1990 gw a b 100 0 eng
010 ▼a 90010201
020 ▼a 3540530002 (Berlin : alk. paper)
020 ▼a 9783540530008 (Berlin : alk. paper)
020 ▼a 0387530002 (New York : alk. paper)
020 ▼a 9780387530000 (New York : alk. paper)
035 ▼a (OCoLC)ocm22243438
035 ▼a (OCoLC)22243438
035 ▼a (KERIS)REF000013778922
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
049 0 ▼l 452076103 ▼v 453
050 0 0 ▼a QA76.9.A25 ▼b A87 1990
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b A932a ▼c 1990
111 2 ▼a AUSCRYPT '90 ▼d (1990 : ▼c University of New South Wales)
245 1 0 ▼a Advances in cryptology--AUSCRYPT '90 : ▼b international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / ▼c J. Seberry, J. Pieprzyk, eds.
246 3 0 ▼a AUSCRYPT '90
260 ▼a Berlin ; ▼a New York : ▼b Springer-Verlag, ▼c c1990.
300 ▼a ix, 462 p. : ▼b ill. ; ▼c 25 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 453
500 ▼a Sponsored by the International Association for Cryptologic Research.
504 ▼a Includes bibliographical references.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Seberry, Jennifer, ▼d 1944-.
700 1 ▼a Pieprzyk, Josef, ▼d 1949-.
710 2 ▼a International Association for Cryptologic Research.
830 0 ▼a Lecture notes in computer science ; ▼v 453.

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 A932a 1990 Accession No. 121186568 Availability Available Due Date Make a Reservation Service B M
No. 2 Location Sejong Academic Information Center/Science & Technology/ Call Number 005.82 A932a 1990 Accession No. 452076103 Availability Available Due Date Make a Reservation Service
No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 A932a 1990 Accession No. 121186568 Availability Available Due Date Make a Reservation Service B M
No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Sejong Academic Information Center/Science & Technology/ Call Number 005.82 A932a 1990 Accession No. 452076103 Availability Available Due Date Make a Reservation Service

Contents information

Table of Contents

The implementation of elliptic curve cryptosystems.- Direct demonstration of the power to break public-key cryptosystems.- Continued fractions and the Berlekamp-Massey algorithm.- Nonlinear generators of binary sequences with controllable complexity and double key.- K-M sequence is forwardly predictable.- Lower bounds on the weight complexities of cascaded binary sequences.- Secure user access control for public networks.- Formal specification and verification of secure communication protocols.- Network security policy models.- KEYMEX: An expert system for the design of key management schemes.- On the formal analysis of PKCS authentication protocols.- Some remarks on authentication systems.- Meet-in-the-middle attack on digital signature schemes.- A binary sequence generator based on Ziv-Lempel source coding.- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence.- Parallel generation of pseudo-random sequences.- Large primes in stream cipher cryptography.- Comparison of block ciphers.- Key scheduling in des type cryptosystems.- LOKI - A cryptographic primitive for authentication and secrecy applications.- Permutation generators of alternating groups.- Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms.- A (non-practical) three-pass identification protocol using coding theory.- Demonstrating possession without revealing factors and its application.- Anonymous one-time signatures and flexible untraceable electronic cash.- Dyadic matrices and their potential significance in cryptography (abstract).- A note on strong Fibonacci pseudoprimes.- On the significance of the directed acyclic word graph in cryptology.- Solving equations in sequences.- The practical application of state of the art security in real environments.- RSA as a benchmark for multiprocessor machines.- Range equations and range matrices: a study in statistical database security.- Record encryption in distributed databases.- VLSI design for exponentiation in GF(2n).- A fast modular-multiplication module for smart cards.- Minos: Extended user authentication.- Universal logic sequences.- The three faces of information security.- Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

윤관식 (2020)