WorldCat Identities

Chaum, David

Overview
Works: 57 works in 173 publications in 4 languages and 2,107 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Author, Other, Creator
Classifications: QA76.9.A25, 005.82
Publication Timeline
.
Most widely held works about David Chaum
 
Most widely held works by David Chaum
Advances in cryptology : proceedings of CRYPTO 84 by G. R Blakley( Book )

43 editions published between 1982 and 2000 in 3 languages and held by 625 WorldCat member libraries worldwide

Recently, there has been a lot of interest in provably "good" pseudo-random number generators [lo, 4, 14, 31. These cryptographically secure generators are "good" in the sense that they pass all probabilistic polynomial time statistical tests. However, despite these nice properties, the secure generators known so far suffer from the han- cap of being inefiicient; the most efiicient of these take n2 steps (one modular multip- cation, n being the length of the seed) to generate one bit. Pseudc-random number g- erators that are currently used in practice output n bits per multiplication (n2 steps). An important open problem was to output even two bits on each multiplication in a cryptographically secure way. This problem was stated by Blum, Blum & Shub [3] in the context of their z2 mod N generator. They further ask: how many bits can be o- put per multiplication, maintaining cryptographic security? In this paper we state a simple condition, the XOR-Condition and show that any generator satisfying this condition can output logn bits on each multiplication. We show that the XOR-Condition is satisfied by the lop least significant bits of the z2-mod N generator. The security of the z2 mod N generator was based on Quadratic Residu- ity [3]. This generator is an example of a Trapdoor Generator [13], and its trapdoor properties have been used in protocol design. We strengthen the security of this gene- tor by proving it as hard as factoring
Advances in cryptology--EUROCRYPT '87 : Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, the Netherlands, April 13-15, 1987 : proceedings by David Chaum( Book )

30 editions published between 1988 and 2000 in English and held by 288 WorldCat member libraries worldwide

This book contains the proceedings of the EUROCRYPT '87 conference, a workshop on theory and applications of cryptographic techniques held at Amsterdam, April 1987. 26 papers were selected from over twice that number submitted to the program committee. The authors come from Europe, North America, and Japan and represent some of the leading research groups working in the fields of cryptography and data security. The subjects covered include sequences and linear complexity; hardware considerations, including random sources, physical security, and cryptographic algorithm implementation; topics in public key cryptography; authentication and secure transactions; hash functions and signatures; and the theory and application of symmetric ciphers
Smart card 2000 : the future of IC cards : proceedings of the IFIP WG 11.6 International Conference on Smart Card 2000--the Future of IC Cards, Laxenburg, Austria, 19-20 October 1987 by IFIP WG 11.6 international conference on the future of IC cards( Book )

10 editions published in 1989 in English and held by 127 WorldCat member libraries worldwide

Smart card 2000 : selected papers from the Second International Smart Card 2000 Conference, Amsterdam, the Netherlands, 4-6 October 1989 by International Smart Card 2000 Conference( Book )

4 editions published in 1991 in English and held by 57 WorldCat member libraries worldwide

Towards trustworthy elections : new directions in electronic voting by David Chaum( Book )

9 editions published in 2010 in English and held by 57 WorldCat member libraries worldwide

State of the art report--[source unknown]
Towards Trustworthy Elections New Directions in Electronic Voting by David Chaum( )

2 editions published in 2010 in English and held by 27 WorldCat member libraries worldwide

EUROCRYPT '87 advances in cryptology ; Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13 - 15, 1987 ; proceedings by EUROCRYPT( )

1 edition published in 1988 in Undetermined and held by 19 WorldCat member libraries worldwide

Frontiers of electronic voting Dagstuhl seminar 07311 ; executive summary( )

1 edition published in 2008 in English and held by 16 WorldCat member libraries worldwide

Frontiers of electronic voting 07311 abstracts collection ; Dagstuhl seminar( )

1 edition published in 2008 in English and held by 16 WorldCat member libraries worldwide

Cryptographically strong undeniable signatures, unconditionally secure for the signer by Eugène van Heijst( Book )

3 editions published in 1991 in English and German and held by 12 WorldCat member libraries worldwide

SmartCash : a practical electronic payment system by Jurjen Norbert Eelco Bos( Book )

7 editions published in 1990 in English and Undetermined and held by 9 WorldCat member libraries worldwide

It only requires simple computations (DES) on the smart card, while it uses RSA to provide good privacy protection. A payment in the SmartCash system takes only a few milliseconds, so it can be used in high-speed applications."
CRYPTO 84 : a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, August 19-22, 1984 by CRYPTO 84: a Workshop on the Theory and Application of Cryptographic Techniques( Book )

2 editions published in 1985 in English and held by 7 WorldCat member libraries worldwide

Minimum disclosure proofs of knowledge by Gilles Brassard( Book )

5 editions published in 1987 in English and Dutch and held by 6 WorldCat member libraries worldwide

Untraceable electronic mail, return addresses, and digital pseudonyms by David Chaum( )

2 editions published in 1979 in English and held by 4 WorldCat member libraries worldwide

Secret ballot elections with unconditional integrity( Book )

1 edition published in 2007 in English and held by 3 WorldCat member libraries worldwide

A practical, voter-verifiable election scheme by David Chaum( Book )

1 edition published in 2004 in English and held by 3 WorldCat member libraries worldwide

Trends in computers & networks by freedom & privacy Video Library Project Computers( Visual )

2 editions published in 1991 in English and held by 3 WorldCat member libraries worldwide

Speakers give an overview and prognosis for computing capabilities and networking as they impact personal privacy, confidentiality, security, one-to-one and many-to-one communications, plus access to information about government, business, technology and society
Advances in Cryptology 1984 by G Blakely( )

2 editions published in 2008 in English and held by 0 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.70 (from 0.29 for Digital do ... to 0.93 for Advances i ...)

Advances in cryptology : proceedings of CRYPTO 84CRYPTO 84 : a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, August 19-22, 1984Advances in Cryptology 1984
Alternative Names
Chaum, D.

Chaum, D. (David)

David Chaum Amerikaans cryptograaf

David Chaum US-amerikanischer Kryptologe

ডেভিড চম

デヴィッド・チャウム

大衛·喬姆

Languages
English (123)

German (2)

Italian (1)

Dutch (1)

Covers
Advances in cryptology--EUROCRYPT '87 : Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, the Netherlands, April 13-15, 1987 : proceedingsTowards trustworthy elections : new directions in electronic votingTowards Trustworthy Elections New Directions in Electronic VotingAdvances in cryptology : Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13 - 15, 1987 ; proceedingsEUROCRYPT '87 advances in cryptology ; Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13 - 15, 1987 ; proceedingsCRYPTO 84 : a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, August 19-22, 1984Advances in Cryptology 1984