Advances in Cryptology — CRYPTO’ 86 (Record no. 35450)

000 -LEADER
fixed length control field 05510nam a22004695i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783540477211
-- 978-3-540-47721-1
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
245 10 - TITLE STATEMENT
Title Advances in Cryptology — CRYPTO’ 86
Sub Title Proceedings /
Statement of responsibility, etc edited by Andrew M. Odlyzko.
246 3# - VARYING FORM OF TITLE
Title proper/short title A Conference on the Theory and Application of Cryptographic Techniques Held at the University of California, Santa Barbara through the Co-operation of the Computer Science Department, August 11 - 15, 1986
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Berlin, Heidelberg :
Name of publisher Springer Berlin Heidelberg,
Year of publication 1987.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XII, 490 p.
Other physical details online resource.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Data Encryption Standard -- Structure in the S-Boxes of the DES (extended abstract) -- Cycle Structure of the DES with Weak and Semi-Weak Keys -- Public-Key Cryptography -- Private-Key Algebraic-Coded Cryptosystems -- Some Variations on RSA Signatures & their Security -- Breaking the Cade Cipher -- A Modification of a Broken Public-Key Cipher -- A Pseudo-Random Bit Generator Based on Elliptic Logarithms -- Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme -- Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?) -- A Secure and Privacy-Protecting Protocol for Transmitting Personal Information Between Organizations -- Cryptographic Protocols And Zero-Knowledge Proofs -- How to Prove All NP Statements in Zero-Knowledge and a Methodology of Cryptographic Protocol Design (Extended Abstract) -- How To Prove Yourself: Practical Solutions to Identification and Signature Problems -- Demonstrating that a Public Predicate can be Satisfied Without Revealing Any Information About How -- Demonstrating Possession of a Discrete Logarithm Without Revealing it -- Cryptographic Capsules: A Disjunctive Primitive for Interactive Protocols -- Zero-Knowledge Simulation of Boolean Circuits -- All-or-Nothing Disclosure of Secrets -- A zero-knowledge Poker protocol that achieves confidentiality of the players’ strategy or How to achieve an electronic Poker face -- Secret-Sharing Methods -- Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract) -- How to Share a Secret with Cheaters -- Smallest Possible Message Expansion in Threshold Schemes -- Hardware Systems -- VLSI implementation of public-key encryption algorithms -- Architectures for exponentiation in GF(2n) -- Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor -- Software Systems -- A High Speed Manipulation Detection Code -- Electronic Funds Transfer Point of Sale in Australia -- Software Protection, Probabilistic Methods, and Other Topics -- The Notion of Security for Probabilistic Cryptosystems (Extended Abstract) -- Large-Scale Randomization Techniques -- On the Linear Span of Binary Sequences Obtained from Finite Geometries -- Some Constructions and Bounds for Authentication Codes -- Towards a Theory of Software Protection (Extended Abstract) -- Informal Contributions -- Two Observations on Probabilistic Primality Testing -- Public Key Registration -- Is there an ultimate use of cryptography? (Extended Abstract) -- Smart Card a Highly Reliable and Portable Security Device -- Thomas — A Complete Single Chip RSA Device.
520 ## - SUMMARY, ETC.
Summary, etc This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have all been held at the University of California at Santa Barbara. The first conference in this series, CRYPTO 81, organized by A. Gersho, did not have a formal proceedings. The proceedings of the following four conferences in this series have been published as: Advances in Cryptology: Proceedings of Crypto 82, D. Chaum, R. L. Rivest, and A. T. Sherman, eds., Plenum, 1983. Advances in Cryptology: Proceedings of Crypto 83, D. Chaum, ed., Plenum, 1984. Advances in Cryptology: Proceedings of CRYPTO 84, G. R. Blakley and D. Chaum, eds., Lecture Notes in Computer Science #196, Springer, 1985. Advances in Cryptology - CRYPTO '85 Proceedings, H. C. Williams, ed., Lecture Notes in Computer Science #218, Springer, 1986. A parallel series of conferences is held annually in Europe. The first of these had its proceedings published as Cryptography: Proceedings, Burg Feuerstein 1982, T. Beth, ed., Lecture Notes in Computer Science #149, Springer, 1983.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data encryption (Computer science).
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data Encryption.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Odlyzko, Andrew M.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/3-540-47721-7
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-BOOKS
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 1987.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
Holdings
Withdrawn status Lost status Damaged status Not for loan Current library Accession Number Uniform Resource Identifier Koha item type
        IMSc Library EBK6156 http://dx.doi.org/10.1007/3-540-47721-7 E-BOOKS
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha