Amazon cover image
Image from Amazon.com
Image from Google Jackets

Advances in Cryptology — EUROCRYPT’ 87 [electronic resource] : Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, The Netherlands, April 13–15, 1987 Proceedings / edited by David Chaum, Wyn L. Price.

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 304Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1988Description: VII, 316 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540391180
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Sequences And Linear Complexity -- In Memoriam Tore Herlestam (1929–1986) -- Alternating Step Generators Controlled by De Bruijn Sequences -- Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution -- Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators -- Sequences with Almost Perfect Linear Complexity Profile -- When Shift Registers Clock Themselves -- Finite State Machine Modelling of Cryptographic Systems in Loops -- Hardware Topics -- Random Sources for Cryptographic Systems -- Physical Protection of Cryptographic Devices -- The RSA Cryptography Processor -- Public Key Topics -- Extension of Brickell’S Algorithm for Breaking High Density Knapsacks -- On Privacy Homomorphisms (Extended Abstract) -- An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations -- A Public Key Analog Gyptosystem -- Authentication and Secure Transactions -- Message Authentication with Arbitration of Transmitter/Receiver Disputes -- Perfect and Essentially Perfect Authentication Schemes -- Message Authentication and Dynamic Passwords -- IC-Cards in High-Security Applications -- Hash Functions and Signatures -- Collision Free Hash Functions and Public Key Signature Schemes -- Hash-Functions Using Modulo-N Operations -- Blinding for Unanticipated Signatures -- Symmetric Ciphers: Theory -- Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers -- Linear Structures in Blockciphers -- Fast Data Encipherment Algorithm FEAL -- Symmetric Ciphers: Application -- Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping -- Security Considerations in the Design and Implementation of a new DES chip -- High-Performance Interface Architectures for Cryptographic Hardware.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified URL Status Date due Barcode
IMSc Library Link to resource Available EBK4592

Sequences And Linear Complexity -- In Memoriam Tore Herlestam (1929–1986) -- Alternating Step Generators Controlled by De Bruijn Sequences -- Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution -- Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators -- Sequences with Almost Perfect Linear Complexity Profile -- When Shift Registers Clock Themselves -- Finite State Machine Modelling of Cryptographic Systems in Loops -- Hardware Topics -- Random Sources for Cryptographic Systems -- Physical Protection of Cryptographic Devices -- The RSA Cryptography Processor -- Public Key Topics -- Extension of Brickell’S Algorithm for Breaking High Density Knapsacks -- On Privacy Homomorphisms (Extended Abstract) -- An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations -- A Public Key Analog Gyptosystem -- Authentication and Secure Transactions -- Message Authentication with Arbitration of Transmitter/Receiver Disputes -- Perfect and Essentially Perfect Authentication Schemes -- Message Authentication and Dynamic Passwords -- IC-Cards in High-Security Applications -- Hash Functions and Signatures -- Collision Free Hash Functions and Public Key Signature Schemes -- Hash-Functions Using Modulo-N Operations -- Blinding for Unanticipated Signatures -- Symmetric Ciphers: Theory -- Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers -- Linear Structures in Blockciphers -- Fast Data Encipherment Algorithm FEAL -- Symmetric Ciphers: Application -- Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping -- Security Considerations in the Design and Implementation of a new DES chip -- High-Performance Interface Architectures for Cryptographic Hardware.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India