HOME > Detail View

Detail View

Advances in cryptology--CRYPTO '86 : proceedings

Advances in cryptology--CRYPTO '86 : proceedings

Material type
Personal Author
Odlyzko, A. M.
Title Statement
Advances in cryptology--CRYPTO '86 : proceedings / A.M. Odlyzko (ed.).
Publication, Distribution, etc
Berlin :   Springer,   c1987.  
Physical Medium
xi, 487 p. : ill. ; 25 cm.
Series Statement
Lecture notes in computer science ;263.
3540180478 0387180478
General Note
Held at the University of California, Santa Barbara.  
Bibliography, Etc. Note
Includes bibiographies and index.
Subject Added Entry-Topical Term
Ordinateurs --Access --Controle --Congres. Cryptographie --Congres. Computers --Access control --Congresses. Cryptography --Congresses.
000 00962camuuu200265 a 4500
001 000001033880
005 19981218094028.0
008 870910s1987 gw a b 101 0 engxd
020 ▼a 3540180478
020 ▼a 0387180478
040 ▼a EUE ▼c EUE ▼d TKN ▼d PIT ▼d FPU ▼d 244002
049 0 ▼l 452037938
090 ▼a 004.1 ▼b L471 ▼c 263
111 2 ▼a CRYPTO 86 ▼d (1986 : ▼c University of California, Santa Barbara)
245 1 0 ▼a Advances in cryptology--CRYPTO '86 : ▼b proceedings / ▼c A.M. Odlyzko (ed.).
260 ▼a Berlin : ▼b Springer, ▼c c1987.
300 ▼a xi, 487 p. : ▼b ill. ; ▼c 25 cm.
440 0 ▼a Lecture notes in computer science ; ▼v 263.
500 ▼a Held at the University of California, Santa Barbara.
504 ▼a Includes bibiographies and index.
650 7 ▼a Ordinateurs ▼x Access ▼x Controle ▼x Congres. ▼2 ram.
650 7 ▼a Cryptographie ▼x Congres. ▼2 ram.
650 0 ▼a Computers ▼x Access control ▼x Congresses.
650 0 ▼a Cryptography ▼x Congresses.
700 1 ▼a Odlyzko, A. M.

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Sejong Academic Information Center/Science & Technology/ Call Number 004.1 L471 263 Accession No. 452037938 Availability Available Due Date Make a Reservation Service C

Contents information

Table of Contents

Data Encryption Standard.- Structure in the S-Boxes of the DES (extended abstract).- Cycle Structure of the DES with Weak and Semi-Weak Keys.- Public-Key Cryptography.- Private-Key Algebraic-Coded Cryptosystems.- Some Variations on RSA Signatures & their Security.- Breaking the Cade Cipher.- A Modification of a Broken Public-Key Cipher.- A Pseudo-Random Bit Generator Based on Elliptic Logarithms.- Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme.- Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?).- A Secure and Privacy-Protecting Protocol for Transmitting Personal Information Between Organizations.- Cryptographic Protocols And Zero-Knowledge Proofs.- How to Prove All NP Statements in Zero-Knowledge and a Methodology of Cryptographic Protocol Design (Extended Abstract).- How To Prove Yourself: Practical Solutions to Identification and Signature Problems.- Demonstrating that a Public Predicate can be Satisfied Without Revealing Any Information About How.- Demonstrating Possession of a Discrete Logarithm Without Revealing it.- Cryptographic Capsules: A Disjunctive Primitive for Interactive Protocols.- Zero-Knowledge Simulation of Boolean Circuits.- All-or-Nothing Disclosure of Secrets.- A zero-knowledge Poker protocol that achieves confidentiality of the players' strategy or How to achieve an electronic Poker face.- Secret-Sharing Methods.- Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract).- How to Share a Secret with Cheaters.- Smallest Possible Message Expansion in Threshold Schemes.- Hardware Systems.- VLSI implementation of public-key encryption algorithms.- Architectures for exponentiation in GF(2n).- Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor.- Software Systems.- A High Speed Manipulation Detection Code.- Electronic Funds Transfer Point of Sale in Australia.- Software Protection, Probabilistic Methods, and Other Topics.- The Notion of Security for Probabilistic Cryptosystems (Extended Abstract).- Large-Scale Randomization Techniques.- On the Linear Span of Binary Sequences Obtained from Finite Geometries.- Some Constructions and Bounds for Authentication Codes.- Towards a Theory of Software Protection (Extended Abstract).- Informal Contributions.- Two Observations on Probabilistic Primality Testing.- Public Key Registration.- Is there an ultimate use of cryptography? (Extended Abstract).- Smart Card a Highly Reliable and Portable Security Device.- Thomas - A Complete Single Chip RSA Device.

Information Provided By: : Aladin

New Arrivals Books in Related Fields