Advances in Cryptology — EUROCRYPT ’93 (Record no. 35692)

000 -LEADER
fixed length control field 05249nam a22005535i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783540482857
-- 978-3-540-48285-7
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
245 10 - TITLE STATEMENT
Title Advances in Cryptology — EUROCRYPT ’93
Sub Title Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23–27, 1993 Proceedings /
Statement of responsibility, etc edited by Tor Helleseth.
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Berlin, Heidelberg :
Name of publisher Springer Berlin Heidelberg,
Year of publication 1994.
300 ## - PHYSICAL DESCRIPTION
Number of Pages X, 465 p.
Other physical details online resource.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Authentication -- On the Relation Between A-Codes and Codes Correcting Independent Errors -- Optimal Authentication Systems -- Public Key -- Factoring Integers Using SIMD Sieves -- A New Elliptic Curve Based Analogue of RSA -- Weaknesses of a public-key cryptosystem based on factorizations of finite groups -- Block Ciphers -- Differentially uniform mappings for cryptography -- On Almost Perfect Nonlinear Permutations -- Two New Classes of Bent Functions -- Boolean functions satisfying a higher order strict avalanche criterion -- Secret Sharing -- Size of Shares and Probability of Cheating in Threshold Schemes -- Nonperfect Secret Sharing Schemes and Matroids -- Stream ciphers -- From the memoirs of a Norwegian cryptologist -- On the Linear Complexity of Products of Shift-Register Sequences -- Resynchronization Weaknesses in Synchronous Stream Ciphers -- Blind Synchronization of m-Sequences with Even Span -- On Constructions and Nonlinearity of Correlation Immune Functions -- Digital signatures -- Practical and Provably Secure Release of a Secret and Exchange of Signatures -- Subliminal Communication is Easy Using the DSA -- Can O.S.S. be Repaired? - Proposal for a New Practical Signature Scheme - -- Protocols I -- On a Limitation of BAN Logic -- Efficient Anonymous Channel and All/Nothing Election Scheme -- Untransferable Rights in a Client-Independent Server Environment -- Interactive Hashing Simplifies Zero-Knowledge Protocol Design -- Hash Functions -- One-Way Accumulators: A Decentralized Alternative to Digital Signatures -- The breaking of the AR Hash Function -- Collisions for the compression function of MD5 -- How to Find and Avoid Collisions for the Knapsack Hash Function -- Payment Systems -- Single Term Off-Line Coins -- Improved Privacy in Wallets with Observers -- Distance-Bounding Protocols -- Cryptanalysis -- On the Distribution of Characteristics in Bijective Mappings -- On the Security of the IDEA Block Cipher -- Linear Cryptanalysis Method for DES Cipher -- New Types of Cryptanalytic Attacks Using Related Keys -- Protocols II -- Secret-Key Reconciliation by Public Discussion -- Global, Unpredictable Bit Generation Without Broadcast -- Rump Session -- On Schnorr’s Preprocessing for Digital Signature Schemes -- Cryptanalysis of the Chang-Wu-Chen key distribution system -- An Alternate Explanation of two BAN-logic “failures” -- The Consequences of Trust in Shared Secret Schemes -- Markov Ciphers and Alternating Groups -- On Key Distribution and Authentication in Mobile Radio Networks.
520 ## - SUMMARY, ETC.
Summary, etc Eurocrypt is a series of open workshops on the theory and application of cryptographic techniques. These meetings have taken place in Europe every year since 1982 and are sponsored by the International Association for Cryptologic Research. Eurocrypt '93 was held in the village of Lofthus in Norway in May 1993. The call for papers resulted in 117 submissions with authors representing 27 different countries. The 36 accepted papers were selected by the program committee after a blind refereeing process. The papers are grouped into parts on authentication, public key, block ciphers, secret sharing, stream ciphers, digital signatures, protocols, hash functions, payment systems, and cryptanalysis. The volume includes 6 further rump session papers.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Operating systems (Computers).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Coding theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Database management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Combinatorics.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Coding and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Database Management.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Combinatorics.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Operating Systems.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Helleseth, Tor.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/3-540-48285-7
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-BOOKS
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 1994.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
Holdings
Withdrawn status Lost status Damaged status Not for loan Current library Accession Number Uniform Resource Identifier Koha item type
        IMSc Library EBK6398 http://dx.doi.org/10.1007/3-540-48285-7 E-BOOKS
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha