000 04260nam a22005775i 4500
001 978-3-540-49363-1
003 DE-He213
005 20160624102042.0
007 cr nn 008mamaa
008 121227s1996 gw | s |||| 0|eng d
020 _a9783540493631
_9978-3-540-49363-1
024 7 _a10.1007/BFb0032342
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
245 1 0 _aCryptography: Policy and Algorithms
_h[electronic resource] :
_bInternational Conference Brisbane, Queensland, Australia, July 3–5, 1995 Proceedings /
_cedited by Ed Dawson, Jovan Golić.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1996.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1996.
300 _aXII, 336 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1029
505 0 _aOpen forum — Cryptography: Personal freedom and law enforcement is it possible to get agreement? -- Privacy and security policy choices in an NII environment -- Commercial Key Escrow: An Australian perspective -- Encryption and the Global Information Infrastructure: An Australian perspective -- Crypto in Europe — markets, law and policy -- Saving dollars makes sense of crypto export controls -- A proposed architecture for trusted third party services -- A new key escrow cryptosystem -- How to fairly reconstruct a shared secret -- A note on nonuniform decimation of periodic sequences -- Randomness measures related to subset occurrence -- Low order approximation of cipher functions -- Multiple encryption with minimum key -- A one-key cryptosystem based on a finite nonlinear automaton -- A cryptanalysis of clock-controlled shift registers with multiple steps -- Discrete optimisation and fast correlation attacks -- Keyed hash functions -- Some active attacks on fast server-aided secret computation protocols for modular exponentiation -- Cryptanalysis of the enhanced ElGamal's signature scheme -- Access with pseudonyms -- A new identification algorithm -- Public-key cryptography on smart cards -- Integrating smart cards into authentication systems -- Smart-card with interferometric quantum cryptography device -- Cryptographic APIs -- Foiling active network impersonation attacks made in collusion with an insider -- The CASS shell.
520 _aThis book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995. Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 0 _aCombinatorics.
650 0 _aTelecommunication.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aCoding and Information Theory.
650 2 4 _aCombinatorics.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSystems and Information Theory in Engineering.
650 2 4 _aCommunications Engineering, Networks.
700 1 _aDawson, Ed.
_eeditor.
700 1 _aGolić, Jovan.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540607595
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1029
856 4 0 _uhttp://dx.doi.org/10.1007/BFb0032342
942 _2EBK6751
_cEBK
999 _c36045
_d36045