000 05077nam a22005535i 4500
001 978-3-540-69528-8
003 DE-He213
005 20160624102057.0
007 cr nn 008mamaa
008 121227s1997 gw | s |||| 0|eng d
020 _a9783540695288
_9978-3-540-69528-8
024 7 _a10.1007/BFb0052223
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
245 1 0 _aAdvances in Cryptology — CRYPTO '97
_h[electronic resource] :
_b17th Annual International Cryptology Conference Santa Barbara, California, USA August 17–21, 1997 Proceedings /
_cedited by Burton S. Kaliski.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1997.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1997.
300 _a546 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1294
505 0 _aThe complexity of computing hard core predicates -- Statistical zero knowledge protocols to prove modular polynomial relations -- Keeping the SZK-verifier honest unconditionally -- On the foundations of modern cryptography -- Plug and play encryption -- Deniable Encryption -- Eliminating decryption errors in the Ajtai-Dwork Cryptosystem -- Public-key cryptosystems from lattice reduction problems -- RSA-based undeniable signatures -- Security of blind digital signatures -- Digital signcryption or how to achieve cost(signature & encryption) ? cost(signature) + cost(encryption) -- How to sign digital streams -- Merkle-Hellman revisited: A cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations -- Failure of the McEliece public-key cryptosystem under message-resend and related-message attack -- A multiplicative attack using LLL algorithm on RSA signatures with redundancy -- On the security of the KMOV public key cryptosystem -- A key recovery attack on discrete log-based schemes using a prime order subgroup -- The prevalence of kleptographic attacks on discrete-log based cryptosystems -- “Pseudo-random” number generation within cryptographic algorithms: The DDS case -- Unconditional security against memory-bounded adversaries -- Privacy amplification secure against active adversaries -- Visual authentication and identification -- Quantum information processing: The good, the bad and the ugly -- Efficient algorithms for elliptic curve cryptosystems -- An improved algorithm for arithmetic on a family of elliptic curves -- Fast RSA-type cryptosystems using n-adic expansion -- A one way function based on ideal arithmetic in number fields -- Efficient anonymous multicast and reception -- Efficient group signature schemes for large groups -- Efficient generation of shared RSA keys -- Proactive RSA -- Towards realizing random oracles: Hash functions that hide all partial information -- Collision-Resistant hashing: Towards making UOWHFs practical -- Fast and secure hashing based on codes -- Edit distance correlation attack on the alternating step generator -- Differential fault analysis of secret key cryptosystems -- Cryptanalysis of the cellular message encryption algorithm -- Security of 2t-root identification and signatures, proceedings CRYPTO'98.
520 _aThis book constitutes the refereed proceedings of the 17th Annual International Cryptology Conference, CRYPTO'97, held in Santa Barbara, California, USA, in August 1997 under the sponsorship of the International Association for Cryptologic Research (IACR). The volume presents 35 revised full papers selected from 160 submissions received. Also included are two invited presentations. The papers are organized in sections on complexity theory, cryptographic primitives, lattice-based cryptography, digital signatures, cryptanalysis of public-key cryptosystems, information theory, elliptic curve implementation, number-theoretic systems, distributed cryptography, hash functions, cryptanalysis of secret-key cryptosystems.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation Systems.
650 0 _aComputer science
_xMathematics.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aComputer Communication Networks.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aComputational Mathematics and Numerical Analysis.
700 1 _aKaliski, Burton S.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540633846
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1294
856 4 0 _uhttp://dx.doi.org/10.1007/BFb0052223
942 _2EBK7240
_cEBK
999 _c36534
_d36534