Link on this page

<E-Book>
Advances in Cryptology – EUROCRYPT '87 : Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings / edited by David Chaum, Wyn L. Price
(Lecture Notes in Computer Science. ISSN:16113349 ; 304)

Edition 1st ed. 1988.
Publisher (Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer)
Year 1988
Language English
Size VII, 316 p : online resource
Authors Chaum, David editor
Price, Wyn L editor
SpringerLink (Online service)
Subjects LCSH:Cryptography
LCSH:Data encryption (Computer science)
FREE:Cryptology
Notes Sequences And Linear Complexity -- In Memoriam Tore Herlestam (1929–1986) -- Alternating Step Generators Controlled by De Bruijn Sequences -- Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution -- Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators -- Sequences with Almost Perfect Linear Complexity Profile -- When Shift Registers Clock Themselves -- Finite State Machine Modelling of Cryptographic Systems in Loops -- Hardware Topics -- Random Sources for Cryptographic Systems -- Physical Protection of Cryptographic Devices -- The RSA Cryptography Processor -- Public Key Topics -- Extension of Brickell’S Algorithm for Breaking High Density Knapsacks -- On Privacy Homomorphisms (Extended Abstract) -- An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations -- A Public Key Analog Gyptosystem -- Authentication and Secure Transactions -- Message Authentication with Arbitration of Transmitter/Receiver Disputes -- Perfect and Essentially Perfect Authentication Schemes -- Message Authentication and Dynamic Passwords -- IC-Cards in High-Security Applications -- Hash Functions and Signatures -- Collision Free Hash Functions and Public Key Signature Schemes -- Hash-Functions Using Modulo-N Operations -- Blinding for Unanticipated Signatures -- Symmetric Ciphers: Theory -- Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers -- Linear Structures in Blockciphers -- Fast Data Encipherment Algorithm FEAL -- Symmetric Ciphers: Application -- Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping -- Security Considerations in the Design and Implementation of a new DES chip -- High-Performance Interface Architectures for Cryptographic Hardware
HTTP:URL=https://doi.org/10.1007/3-540-39118-5
TOC

Hide book details.

E-Book オンライン 電子ブック

Springer eBooks 9783540391180
電子リソース
EB00225003

Hide details.

Material Type E-Book
Classification LCC:QA268
DC23:005.824
ID 4001088812
ISBN 9783540391180

 Similar Items