<E-Book>
Advances in Cryptology – EUROCRYPT '87 : Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings / edited by David Chaum, Wyn L. Price
(Lecture Notes in Computer Science. ISSN:16113349 ; 304)
Edition | 1st ed. 1988. |
---|---|
Publisher | Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer |
Year | 1988 |
Language | English |
Size | VII, 316 p : online resource |
Authors | Chaum, David editor Price, Wyn L editor SpringerLink (Online service) |
Subjects | LCSH:Cryptography LCSH:Data encryption (Computer science) FREE:Cryptology |
Notes | Sequences And Linear Complexity -- In Memoriam Tore Herlestam (1929–1986) -- Alternating Step Generators Controlled by De Bruijn Sequences -- Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution -- Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators -- Sequences with Almost Perfect Linear Complexity Profile -- When Shift Registers Clock Themselves -- Finite State Machine Modelling of Cryptographic Systems in Loops -- Hardware Topics -- Random Sources for Cryptographic Systems -- Physical Protection of Cryptographic Devices -- The RSA Cryptography Processor -- Public Key Topics -- Extension of Brickell’S Algorithm for Breaking High Density Knapsacks -- On Privacy Homomorphisms (Extended Abstract) -- An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations -- A Public Key Analog Gyptosystem -- Authentication and Secure Transactions -- Message Authentication with Arbitration of Transmitter/Receiver Disputes -- Perfect and Essentially Perfect Authentication Schemes -- Message Authentication and Dynamic Passwords -- IC-Cards in High-Security Applications -- Hash Functions and Signatures -- Collision Free Hash Functions and Public Key Signature Schemes -- Hash-Functions Using Modulo-N Operations -- Blinding for Unanticipated Signatures -- Symmetric Ciphers: Theory -- Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers -- Linear Structures in Blockciphers -- Fast Data Encipherment Algorithm FEAL -- Symmetric Ciphers: Application -- Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping -- Security Considerations in the Design and Implementation of a new DES chip -- High-Performance Interface Architectures for Cryptographic Hardware HTTP:URL=https://doi.org/10.1007/3-540-39118-5 |
TOC
Hide book details.
E-Book | Location | Media type | Volume | Call No. | Status | Reserve | Comments | ISBN | Printed | Restriction | Designated Book | Barcode No. |
---|---|---|---|---|---|---|---|---|---|---|---|---|
E-Book | オンライン | 電子ブック |
|
|
Springer eBooks | 9783540391180 |
|
電子リソース |
|
EB00225003 |