Advances in Cryptology — EUROCRYPT ’91 (Record no. 35067)

000 -LEADER
fixed length control field 06928nam a22005535i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783540464167
-- 978-3-540-46416-7
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
245 10 - TITLE STATEMENT
Title Advances in Cryptology — EUROCRYPT ’91
Sub Title Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings /
Statement of responsibility, etc edited by Donald W. Davies.
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Berlin, Heidelberg :
Name of publisher Springer Berlin Heidelberg,
Year of publication 1991.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XII, 556 pp.
Other physical details online resource.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cryptanalysis I -- Differential Cryptanalysis of Feal and N-Hash -- Markov Ciphers and Differential Cryptanalysis -- The Knapsack Hash Function proposed at Crypto’89 can be broken -- Cryptanalysis II -- An Improved Low-Density Subset Sum Algorithm -- Cryptanalysis of McEliece’s Public-Key Cryptosystem -- On the Security of the Schnorr Scheme using Preprocessing -- Zero Knowledge and Oblivious Transfer -- Broadcast Interactive Proofs -- Direct Zero Knowledge Proofs of Computational Power in Five Rounds -- On the Reversibility of Oblivious Transfer -- Sequences I -- Ziv-Lempel Complexity for Periodic Sequences and its Cryptographic Application -- A Secret Key Cryptosystem by Iterating a Chaotic Map -- Boolean Functions Satisfying Higher Order Propagation Criteria -- Sequences II -- The Maximum Order Complexity of Sequence Ensembles -- The Number of Output Sequences of a Binary Sequence Generator -- Linear Complexity of Periodically Repeated Random Sequences -- Sequences III -- On A Fast Correlation Attack on Certain Stream Ciphers -- Analysis of Pseudo Random Sequences Generated by Cellular Automata -- On Binary Sequences from Recursions “modulo 2e” Made Non-Linear by the Bit-By-Bit “XOR” Function -- Signatures -- Weaknesses of Undeniable Signature Schemes -- Distributed Provers with Applications to Undeniable Signatures -- Interactive Bi-Proof Systems and Undeniable Signature Schemes -- Group Signatures -- Theory I -- Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects -- Factoring Integers and Computing Discrete Logarithms via Diophantine Approximation -- Some Considerations concerning the Selection of RSA Moduli -- On the Use of Interconnection Networks in Cryptography -- Theory II -- Non Supersingular Elliptic Curves for Public Key Cryptosystems -- Building Cyclic Elliptic Curves Modulo Large Primes -- On the Complexity of Hyperelliptic Discrete Logarithm Problem -- S-Box Criteria -- An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks -- Enumerating Nondegenerate Permutations -- Perfect nonlinear S-boxes -- Applications I -- A Formal Approach to Security Architectures -- Discrete Logarithm Based Protocols -- Human Identification Through Insecure Channel -- The Automated Cryptanalysis of Analog Speech Scramblers -- Applications II -- A Construction for One Way Hash Functions and Pseudorandom Bit Generators -- ESIGN: An Efficient Digital Signature Implementation for Smart Cards -- New Approaches to the Design of Self-Synchronizing Stream Ciphers -- Randomized Authentication Systems -- Public Key Cryptography -- Ideals over a Non-Commutative Ring and their Application in Cryptology -- Self-certified public keys -- Non-interactive Public-Key Cryptography -- Short Papers presented at the “Rump Session” -- Hash Functions And Graphs With Large Girths -- Dickson Pseudoprimes and Primality Testing -- Equivalent Goppa Codes and Trapdoors to McEliece’s Public Key Cryptosystem -- A Threshold Cryptosystem without a Trusted Party -- A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction -- Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT’91 -- How To Broadcast A Secret -- Probabilistic Analysis of Elementary Randomizers -- Race Integrity Primitives Evaluation (RIPE): A status report -- The Information Leakage through a Randomly Generated Function -- Some Weaknesses of “Weaknesses of Undeniable Signatures”.
520 ## - SUMMARY, ETC.
Summary, etc A series of open workshops devoted to modem cryptology began in Santa Barbara, California in 1981 and was followed in 1982 by a European counterpart in Burg Feurstein, Germany. The series has been maintained with summer meetings in Santa Barbara and spring meetings somewhere in Europe. At the 1983 meeting in Santa Barbara the International Association for Cryptologic Research was launched and it now sponsors all the meetings of the series. Following the tradition of the series, papers were invited in the form of extended abstracts and were reviewed by the programme committee, which selected those to be presented. After the meeting, full papers were produced, in some cases with impro- ments and corrections. These papers form the main part of the present volume. They are placed in the same order that they took at the meeting and under the same headings, for ease of reference by those who attended. The classification under these headings was a little arbitary, needing to fit the timing of the day‘s activities, but it makes a workable method of arrangement. Also following tradition, a “rump session’’ was held during one evening, under the effective chairmanship of John Gordon. These were short presentations and those present found them to have some real interest, therefore we have taken the unusual step of including short papers contributed by the rump session speakers at the end of this volume, with a necessarily simplified review process.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Operating systems (Computers).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Coding theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Database management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Combinatorics.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Coding and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Database Management.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Combinatorics.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Operating Systems.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Davies, Donald W.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/3-540-46416-6
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-BOOKS
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 1991.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
Holdings
Withdrawn status Lost status Damaged status Not for loan Current library Accession Number Uniform Resource Identifier Koha item type
        IMSc Library EBK5773 http://dx.doi.org/10.1007/3-540-46416-6 E-BOOKS
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha