000 04563nam a22005055i 4500
001 978-3-540-39799-1
003 DE-He213
005 20160624101945.0
007 cr nn 008mamaa
008 121227s1986 gw | s |||| 0|eng d
020 _a9783540397991
_9978-3-540-39799-1
024 7 _a10.1007/3-540-39799-X
_2doi
050 4 _aTK7887.5
050 4 _aTK7887.5-7887.8
072 7 _aUT
_2bicssc
072 7 _aUNK
_2bicssc
072 7 _aCOM020010
_2bisacsh
082 0 4 _a004.6
_223
245 1 0 _aAdvances in Cryptology — CRYPTO ’85 Proceedings
_h[electronic resource] /
_cedited by Hugh C. Williams.
246 3 _aA Conference on the Theory and Application of Cryptographic Techniques, Held at he University of California, Santa Barbara, through the Co-operation of the Computer Science Department, August 18 - 220, 1985
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1986.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1986.
300 _aXII, 552 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v218
505 0 _aSignatures and authentication -- Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields -- Another Birthday Attack -- Attacks on Some RSA Signatures -- An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi -- A Secure Subliminal Channel (?) -- Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences -- Protocols -- On the Security of Ping-Pong Protocols when Implemented using the RSA (Extended Abstract) -- A Secure Poker Protocol that Minimizes the Effect of Player Coalitions -- A Framework for the Study of Cryptographic Protocols -- Cheating at Mental Poker -- Security for the DoD Transmission Control Protocol -- Symmetric Public-Key Encryption -- Copy Protection -- Software Protection: Myth or Reality? -- Public Protection of Software -- Fingerprinting Long Forgiving Messages -- Single Key Cryptology -- Cryptanalysis of des with a Reduced Number of Rounds -- Is DES a Pure Cipher? (Results of More Cycling Experiments on DES) (Preliminary Abstract) -- A Layered Approach to the Design of Private Key Cryptosystems -- Lifetimes of Keys in Cryptographic Key Management Systems -- Correlation Immunity and the Summation Generator -- Design of Combiners to Prevent Divide and Conquer Attacks -- On the Security of DES -- Information theory without the finiteness assumption, II. Unfolding the DES -- Two Key Cryptology -- Analysis of a Public Key Approach Based on Polynomial Substitution -- Developing an RSA Chip -- An M3 Public-Key Encryption Scheme -- Trapdoor Rings And Their Use In Cryptography -- On Computing Logarithms Over Finite Fields -- N Using RSA with Low Exponent in a Public Key Network -- Lenstra’s Factorisation Method Based on Elliptic Curves -- Use of Elliptic Curves in Cryptography -- Randomness and Other Problems -- Cryptography with Cellular Automata -- Efficient Parallel Pseudo-Random Number Generation -- How to Construct Pseudo-random Permutations from Pseudo-random Functions -- The Bit Security of Modular Squaring given Partial Factorization of the Modulos -- Some Cryptographic Aspects of Womcodes -- How to Reduce your Enemy’s Information (extended abstract) -- Encrypting Problem Instances -- Divergence Bounds on Key Equivocation and Error Probability in Cryptanalysis -- Impromptu Talks -- A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes -- On the Design of S-Boxes -- The Real Reason for Rivest’s Phenomenon -- The Importance of “Good” Key Scheduling Schemes (How to Make a Secure DES* Scheme with ? 48 Bit Keys?) -- Access Control at the Netherlands Postal and Telecommunications Services.
650 0 _aComputer science.
650 0 _aData transmission systems.
650 0 _aTelecommunication.
650 1 4 _aComputer Science.
650 2 4 _aInput/Output and Data Communications.
650 2 4 _aCommunications Engineering, Networks.
700 1 _aWilliams, Hugh C.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540164630
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v218
856 4 0 _uhttp://dx.doi.org/10.1007/3-540-39799-X
942 _2EBK4718
_cEBK
999 _c34012
_d34012