Amazon cover image
Image from Amazon.com

Advances in Cryptology [electronic resource] : Proceedings of EUROCRYPT 84 A Workshop on the Theory and Application of Cryptographic Techniques Paris, France, April 9– 11, 1984 / edited by Thomas Beth, Norbert Cot, Ingemar Ingemarsson.

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 209Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1985Description: X, 494 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540397571
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
General Theory, Classical Methods -- Cryptology and Complexity Theories -- On Cryptosystems Based on Polynomials and Finite Fields -- Algebraical Structures of Cryptographic Transformations -- Non Linear Non Commutative Functions for Data Integrity -- Wire-Tap Channel II -- Equivocations for Homophonic Ciphers -- Propagation Characteristics of the DES -- Linear Ciphers and Random Sequence Generators with Multiple Clocks -- The Stop-and-Go-Generator -- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers -- On the linear complexity of cascaded sequences -- Public-Key Systems -- RSA-bits are 0.5 + ? secure -- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract) -- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme -- A New Trapdoor Knapsack Public Key Cryptosystem -- RSA Chips (Past/Present/Future) (Extended abstract) -- Number Theoretical Papers -- The Quadratic Sieve Factoring Algorithm -- Status Report on Factoring (At the Sandia National Laboratories) -- Strong Primes are Easy to Find -- Discrete logarithms in finite fields and their cryptographic significance -- Channels, Networks, Key Distribution, Protocols -- User Functions for the Generation and Distribution of Encipherment Keys -- An Optimal Class of Symmetric Key Generation Systems -- On the Use of the Binary Multiplying Channel in a Private Communication System -- Secrecy and Privacy in a Local Area Network Environment -- The Subliminal Channel and Digital Signatures -- A Provably Secure Oblivious Transfer Protocol -- On Concurrent Identification Protocols (Extended Abstract) -- Applications -- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System -- Security of Transportable Computerized Files -- Encryption and Key Management for the ECS Statellite Service -- An Encryption and Authentification Procedure for Telesurveillance Systems -- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques -- Smart Cards -- Session on Smart Cards Tuesday April 10 -- Smart Card Applications in Security and Data Protection -- Bull CP8 Smart Card Uses in Cryptology -- Estimation of some Encryption Functions Implemented into Smart Cards -- Smart Cards and Conditional Access.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified URL Status Date due Barcode
IMSc Library Link to resource Available EBK4706

General Theory, Classical Methods -- Cryptology and Complexity Theories -- On Cryptosystems Based on Polynomials and Finite Fields -- Algebraical Structures of Cryptographic Transformations -- Non Linear Non Commutative Functions for Data Integrity -- Wire-Tap Channel II -- Equivocations for Homophonic Ciphers -- Propagation Characteristics of the DES -- Linear Ciphers and Random Sequence Generators with Multiple Clocks -- The Stop-and-Go-Generator -- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers -- On the linear complexity of cascaded sequences -- Public-Key Systems -- RSA-bits are 0.5 + ? secure -- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract) -- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme -- A New Trapdoor Knapsack Public Key Cryptosystem -- RSA Chips (Past/Present/Future) (Extended abstract) -- Number Theoretical Papers -- The Quadratic Sieve Factoring Algorithm -- Status Report on Factoring (At the Sandia National Laboratories) -- Strong Primes are Easy to Find -- Discrete logarithms in finite fields and their cryptographic significance -- Channels, Networks, Key Distribution, Protocols -- User Functions for the Generation and Distribution of Encipherment Keys -- An Optimal Class of Symmetric Key Generation Systems -- On the Use of the Binary Multiplying Channel in a Private Communication System -- Secrecy and Privacy in a Local Area Network Environment -- The Subliminal Channel and Digital Signatures -- A Provably Secure Oblivious Transfer Protocol -- On Concurrent Identification Protocols (Extended Abstract) -- Applications -- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System -- Security of Transportable Computerized Files -- Encryption and Key Management for the ECS Statellite Service -- An Encryption and Authentification Procedure for Telesurveillance Systems -- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques -- Smart Cards -- Session on Smart Cards Tuesday April 10 -- Smart Card Applications in Security and Data Protection -- Bull CP8 Smart Card Uses in Cryptology -- Estimation of some Encryption Functions Implemented into Smart Cards -- Smart Cards and Conditional Access.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India