HOME > 상세정보

상세정보

Advances in cryptology--CRYPTO '86 : proceedings

Advances in cryptology--CRYPTO '86 : proceedings

자료유형
단행본
개인저자
Odlyzko, A. M.
서명 / 저자사항
Advances in cryptology--CRYPTO '86 : proceedings / A.M. Odlyzko (ed.).
발행사항
Berlin :   Springer,   c1987.  
형태사항
xi, 487 p. : ill. ; 25 cm.
총서사항
Lecture notes in computer science ;263.
ISBN
3540180478 0387180478
일반주기
Held at the University of California, Santa Barbara.  
서지주기
Includes bibiographies and index.
일반주제명
Ordinateurs --Access --Controle --Congres. Cryptographie --Congres. Computers --Access control --Congresses. Cryptography --Congresses.
000 00962camuuu200265 a 4500
001 000001033880
005 19981218094028.0
008 870910s1987 gw a b 101 0 engxd
020 ▼a 3540180478
020 ▼a 0387180478
040 ▼a EUE ▼c EUE ▼d TKN ▼d PIT ▼d FPU ▼d 244002
049 0 ▼l 452037938
090 ▼a 004.1 ▼b L471 ▼c 263
111 2 ▼a CRYPTO 86 ▼d (1986 : ▼c University of California, Santa Barbara)
245 1 0 ▼a Advances in cryptology--CRYPTO '86 : ▼b proceedings / ▼c A.M. Odlyzko (ed.).
260 ▼a Berlin : ▼b Springer, ▼c c1987.
300 ▼a xi, 487 p. : ▼b ill. ; ▼c 25 cm.
440 0 ▼a Lecture notes in computer science ; ▼v 263.
500 ▼a Held at the University of California, Santa Barbara.
504 ▼a Includes bibiographies and index.
650 7 ▼a Ordinateurs ▼x Access ▼x Controle ▼x Congres. ▼2 ram.
650 7 ▼a Cryptographie ▼x Congres. ▼2 ram.
650 0 ▼a Computers ▼x Access control ▼x Congresses.
650 0 ▼a Cryptography ▼x Congresses.
700 1 ▼a Odlyzko, A. M.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실/ 청구기호 004.1 L471 263 등록번호 452037938 도서상태 대출가능 반납예정일 예약 서비스 C

컨텐츠정보

목차

Data Encryption Standard.- Structure in the S-Boxes of the DES (extended abstract).- Cycle Structure of the DES with Weak and Semi-Weak Keys.- Public-Key Cryptography.- Private-Key Algebraic-Coded Cryptosystems.- Some Variations on RSA Signatures & their Security.- Breaking the Cade Cipher.- A Modification of a Broken Public-Key Cipher.- A Pseudo-Random Bit Generator Based on Elliptic Logarithms.- Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme.- Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?).- A Secure and Privacy-Protecting Protocol for Transmitting Personal Information Between Organizations.- Cryptographic Protocols And Zero-Knowledge Proofs.- How to Prove All NP Statements in Zero-Knowledge and a Methodology of Cryptographic Protocol Design (Extended Abstract).- How To Prove Yourself: Practical Solutions to Identification and Signature Problems.- Demonstrating that a Public Predicate can be Satisfied Without Revealing Any Information About How.- Demonstrating Possession of a Discrete Logarithm Without Revealing it.- Cryptographic Capsules: A Disjunctive Primitive for Interactive Protocols.- Zero-Knowledge Simulation of Boolean Circuits.- All-or-Nothing Disclosure of Secrets.- A zero-knowledge Poker protocol that achieves confidentiality of the players' strategy or How to achieve an electronic Poker face.- Secret-Sharing Methods.- Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract).- How to Share a Secret with Cheaters.- Smallest Possible Message Expansion in Threshold Schemes.- Hardware Systems.- VLSI implementation of public-key encryption algorithms.- Architectures for exponentiation in GF(2n).- Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor.- Software Systems.- A High Speed Manipulation Detection Code.- Electronic Funds Transfer Point of Sale in Australia.- Software Protection, Probabilistic Methods, and Other Topics.- The Notion of Security for Probabilistic Cryptosystems (Extended Abstract).- Large-Scale Randomization Techniques.- On the Linear Span of Binary Sequences Obtained from Finite Geometries.- Some Constructions and Bounds for Authentication Codes.- Towards a Theory of Software Protection (Extended Abstract).- Informal Contributions.- Two Observations on Probabilistic Primality Testing.- Public Key Registration.- Is there an ultimate use of cryptography? (Extended Abstract).- Smart Card a Highly Reliable and Portable Security Device.- Thomas - A Complete Single Chip RSA Device.


정보제공 : Aladin

관련분야 신착자료

김종원 (2020)
김자미 (2021)