<電子ブック>
Advances in Cryptology – EUROCRYPT '87 : Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings / edited by David Chaum, Wyn L. Price
(Lecture Notes in Computer Science. ISSN:16113349 ; 304)
版 | 1st ed. 1988. |
---|---|
出版者 | (Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer) |
出版年 | 1988 |
本文言語 | 英語 |
大きさ | VII, 316 p : online resource |
著者標目 | Chaum, David editor Price, Wyn L editor SpringerLink (Online service) |
件 名 | LCSH:Cryptography LCSH:Data encryption (Computer science) FREE:Cryptology |
一般注記 | Sequences And Linear Complexity -- In Memoriam Tore Herlestam (1929–1986) -- Alternating Step Generators Controlled by De Bruijn Sequences -- Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution -- Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators -- Sequences with Almost Perfect Linear Complexity Profile -- When Shift Registers Clock Themselves -- Finite State Machine Modelling of Cryptographic Systems in Loops -- Hardware Topics -- Random Sources for Cryptographic Systems -- Physical Protection of Cryptographic Devices -- The RSA Cryptography Processor -- Public Key Topics -- Extension of Brickell’S Algorithm for Breaking High Density Knapsacks -- On Privacy Homomorphisms (Extended Abstract) -- An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations -- A Public Key Analog Gyptosystem -- Authentication and Secure Transactions -- Message Authentication with Arbitration of Transmitter/Receiver Disputes -- Perfect and Essentially Perfect Authentication Schemes -- Message Authentication and Dynamic Passwords -- IC-Cards in High-Security Applications -- Hash Functions and Signatures -- Collision Free Hash Functions and Public Key Signature Schemes -- Hash-Functions Using Modulo-N Operations -- Blinding for Unanticipated Signatures -- Symmetric Ciphers: Theory -- Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers -- Linear Structures in Blockciphers -- Fast Data Encipherment Algorithm FEAL -- Symmetric Ciphers: Application -- Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping -- Security Considerations in the Design and Implementation of a new DES chip -- High-Performance Interface Architectures for Cryptographic Hardware HTTP:URL=https://doi.org/10.1007/3-540-39118-5 |
目次/あらすじ
所蔵情報を非表示
電子ブック | 配架場所 | 資料種別 | 巻 次 | 請求記号 | 状 態 | 予約 | コメント | ISBN | 刷 年 | 利用注記 | 指定図書 | 登録番号 |
---|---|---|---|---|---|---|---|---|---|---|---|---|
電子ブック | オンライン | 電子ブック |
|
Springer eBooks | 9783540391180 |
|
電子リソース |
|
EB00225003 |