このページのリンク

<電子ブック>
Advances in Cryptology — CRYPTO ’91 : Proceedings / edited by Joan Feigenbaum
(Lecture Notes in Computer Science. ISSN:16113349 ; 576)

1st ed. 1992.
出版者 (Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer)
出版年 1992
本文言語 英語
大きさ X, 484 p : online resource
著者標目 Feigenbaum, Joan editor
SpringerLink (Online service)
件 名 LCSH:Cryptography
LCSH:Data encryption (Computer science)
FREE:Cryptology
一般注記 Protocol Design and Analysis -- A Calculus for Access Control in Distributed Systems -- Deriving the Complete Knowledge of Participants in Cryptographic Protocols -- Systematic Design of Two-Party Authentication Protocols -- Combinatorics and Authentication -- Combinatorial characterizations of authentication codes -- Universal hashing and authentication codes -- On Correlation-immune functions -- Secret Sharing and Information Theory -- On the Size of Shares for Secret Sharing Schemes -- On Verification in Secret Sharing -- Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing -- Multiparty Secret Key Exchange Using a Random Deal of Cards -- Cryptanalysis -- Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer -- A Known Plaintext Attack of FEAL-4 and FEAL-6 -- A switching closure test to analyze cryptosystems -- An Attack on the Last Two Rounds of MD4 -- The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks -- Complexity Theory -- A One-Round, Two-Prover, Zero-Knowledge Protocol for NP -- Interactive Proofs with Space Bounded Provers -- Functional Inversion and Communication Complexity -- The Use of Interaction in Public Cryptosystems. -- Cryptographic Schemes Based on Number Theory -- New Public-Key Schemes Based on Elliptic Curves over the Ring Zn -- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems -- CM-Curves with Good Cryptographic Properties -- A New ID-Based Key Sharing System -- Pseudorandomness -- Pseudo-random Generators from One-way Functions -- New Results on Pseudorandom Permutation Generators Based on the Des Scheme -- Applications and Implementations -- Faster Modular Multiplication by Operand Scaling -- Universal Electronic Cash -- How to Break and Repair a “Provably Secure” Untraceable Payment System -- Practical Quantum Oblivious Transfer -- Exploiting Parallelism in Hardware Implementation of the DES -- Secure Computation Protocols -- Foundations of Secure Interactive Computing -- Secure Computation -- A Cryptographic Scheme for Computerized General Elections -- Efficient Multiparty Protocols Using Circuit Randomization -- Public-Key Cryptosystems and Signatures -- Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack -- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks -- Shared generation of authenticators and signatures -- Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer
HTTP:URL=https://doi.org/10.1007/3-540-46766-1
目次/あらすじ

所蔵情報を非表示

電子ブック オンライン 電子ブック

Springer eBooks 9783540467663
電子リソース
EB00225304

書誌詳細を非表示

データ種別 電子ブック
分 類 LCC:QA268
DC23:005.824
書誌ID 4001090078
ISBN 9783540467663

 類似資料