skip to content
Advances in cryptology--AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings Preview this item
ClosePreview this item
Checking...

Advances in cryptology--AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings

Author: Jennifer Seberry; Yuliang Zheng
Publisher: Berlin ; New York : Springer-Verlag, ©1993.
Series: Lecture notes in computer science, 718.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:

The articles cover allmain topics in modern computer and communications securityresearch.These include:- authentication- secret sharing- digital signatures- one-way hashing  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Conference papers and proceedings
Congresses
Material Type: Conference publication, Document, Internet resource
Document Type: Book, Computer File, Internet Resource
All Authors / Contributors: Jennifer Seberry; Yuliang Zheng
ISBN: 3540572201 9783540572206 0387572201 9780387572208
OCLC Number: 29186866
Description: xiii, 542 pages : illustrations ; 24 cm.
Contents: Threshold cryptosystems.- Authentication codes with perfect protection.- Practical proven secure authentication with arbitration.- Authentication codes under impersonation attack.- Cumulative arrays and geometric secret sharing schemes.- Nonperfect secret sharing schemes.- A construction of practical secret sharing schemes using linear block codes.- HAVAL - A one-way hashing algorithm with variable length of output (extended abstract).- On the power of memory in the design of collision resistant hash functions.- A practical digital multisignature scheme based on discrete logarithms (extended abstract).- Group-oriented undeniable signature schemes without the assistance of a mutually trusted party.- Highly nonlinear 0-1 balanced boolean functions satisfying strict avalanche criterion (extended abstract).- Linear nonequivalence versus nonlinearity.- Constructing large cryptographically strong S-boxes.- Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept.- Cryptanalysis of LOKI 91.- Cryptanalysis of summation generator.- Secure addition sequence and its applications on the server-aided secret computation protocols.- Subliminal channels for signature transfer and their application to signature distribution schemes.- A practical secret voting scheme for large scale elections.- Privacy for multi-party protocols.- New protocols for electronic money.- Modelling and analyzing cryptographic protocols using Petri nets.- On verifiable implicit asking protocols for RSA computation.- Modified Maurer-Yacobi's scheme and its applications.- The vulnerability of geometric sequences based on fields of odd characteristic.- A fast cryptographic checksum algorithm based on stream ciphers.- An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure.- Construction of m-ary de Bruijn sequences (extended abstract).- Information technology security standards - An Australian perspective.- Non-interactive generation of shared pseudorandom sequences.- A generalized description of DES-based and Benes-based permutationgenerators.- Prime generation with the Demytko-Miller-Trbovich algorithm.- Constructions of feebly-one-way families of permutations.- On bit correlations among preimages of "Many to one" One-way functions.- The fast cascade exponentiation algorithm and its applications on cryptography.- The design of a conference key distribution system.- Remarks on "The design of a Conference Key Distribution System".- Public-key cryptosystem based on the discrete logarithm problem.- Elliptic curves over F p suitable for cryptosystems.- The probability Distribution of the Diffie-Hellman Key.- A modular exponentiation unit based on systolic arrays.- A comparison of key distribution patterns constructed from circle geometries.- A block cipher method using combinations of different methods under the control of the user key.- An attack on two hash functions by Zheng-Matsumoto-Imai.- Primality testing with Lucas functions.
Series Title: Lecture notes in computer science, 718.
Responsibility: Jennifer Seberry, Yuliang Zheng, eds.
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/29186866> # Advances in cryptology--AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
   library:oclcnum "29186866" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/3769410212#Place/berlin> ; # Berlin
   library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
   schema:about <http://experiment.worldcat.org/entity/work/data/3769410212#Topic/securite_reseau> ; # sécurité réseau
   schema:about <http://experiment.worldcat.org/entity/work/data/3769410212#Topic/computer_security> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/3769410212#Topic/cryptographie> ; # cryptographie
   schema:about <http://experiment.worldcat.org/entity/work/data/3769410212#Topic/securite_informatique_congres> ; # Sécurité informatique--Congrès
   schema:about <http://experiment.worldcat.org/entity/work/data/3769410212#Topic/signature> ; # signature
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/3769410212#Topic/suite_pseudo_aleatoire> ; # suite pseudo-aléatoire
   schema:about <http://experiment.worldcat.org/entity/work/data/3769410212#Topic/cryptographie_congres> ; # Cryptographie--Congrès
   schema:about <http://experiment.worldcat.org/entity/work/data/3769410212#Topic/systemes_informatiques_mesures_de_surete_congres> ; # Systèmes informatiques--Mesures de sûreté--Congrès
   schema:about <http://experiment.worldcat.org/entity/work/data/3769410212#Topic/authentification> ; # authentification
   schema:about <http://dewey.info/class/005.82/e20/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/3769410212#Topic/computabilidade_e_modelos_de_computacao> ; # Computabilidade E Modelos De Computacao
   schema:about <http://experiment.worldcat.org/entity/work/data/3769410212#Topic/cryptography> ; # Cryptography
   schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/85472982> ; # Yuliang Zheng
   schema:contributor <http://viaf.org/viaf/54224429> ; # Jennifer Seberry
   schema:copyrightYear "1993" ;
   schema:creator <http://experiment.worldcat.org/entity/work/data/3769410212#Meeting/auscrypt_workshop_1992_gold_coast_qld> ; # AUSCRYPT (Workshop) (1992 : Gold Coast, Qld.)
   schema:datePublished "1993" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/3769410212> ;
   schema:genre "Conference papers and proceedings"@en ;
   schema:genre "Conference publication"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/3769410212#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
   schema:name "Advances in cryptology--AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings"@en ;
   schema:productID "29186866" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/29186866#PublicationEvent/berlin_new_york_springer_verlag_1993> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/3769410212#Agent/springer_verlag> ; # Springer-Verlag
   schema:url <http://www.library.tufts.edu/ezproxy/ezproxy.asp?LOCATION=SpLinkLeNoCoSc> ;
   schema:workExample <http://worldcat.org/isbn/9780387572208> ;
   schema:workExample <http://worldcat.org/isbn/9783540572206> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/29186866> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
   schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/3769410212#Agent/springer_verlag> # Springer-Verlag
    a bgn:Agent ;
   schema:name "Springer-Verlag" ;
    .

<http://experiment.worldcat.org/entity/work/data/3769410212#Meeting/auscrypt_workshop_1992_gold_coast_qld> # AUSCRYPT (Workshop) (1992 : Gold Coast, Qld.)
    a bgn:Meeting, schema:Event ;
   schema:location <http://experiment.worldcat.org/entity/work/data/3769410212#Place/gold_coast_qld> ; # Gold Coast, Qld.)
   schema:name "AUSCRYPT (Workshop) (1992 : Gold Coast, Qld.)" ;
    .

<http://experiment.worldcat.org/entity/work/data/3769410212#Place/gold_coast_qld> # Gold Coast, Qld.)
    a schema:Place ;
   schema:name "Gold Coast, Qld.)" ;
    .

<http://experiment.worldcat.org/entity/work/data/3769410212#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/29186866> ; # Advances in cryptology--AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings
   schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/3769410212#Topic/computabilidade_e_modelos_de_computacao> # Computabilidade E Modelos De Computacao
    a schema:Intangible ;
   schema:name "Computabilidade E Modelos De Computacao"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/3769410212#Topic/cryptographie_congres> # Cryptographie--Congrès
    a schema:Intangible ;
   schema:name "Cryptographie--Congrès"@en ;
   schema:name "Cryptographie--Congrès"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/3769410212#Topic/securite_informatique_congres> # Sécurité informatique--Congrès
    a schema:Intangible ;
   schema:name "Sécurité informatique--Congrès"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/3769410212#Topic/securite_reseau> # sécurité réseau
    a schema:Intangible ;
   schema:name "sécurité réseau"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/3769410212#Topic/suite_pseudo_aleatoire> # suite pseudo-aléatoire
    a schema:Intangible ;
   schema:name "suite pseudo-aléatoire"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/3769410212#Topic/systemes_informatiques_mesures_de_surete_congres> # Systèmes informatiques--Mesures de sûreté--Congrès
    a schema:Intangible ;
   schema:name "Systèmes informatiques--Mesures de sûreté--Congrès"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
   schema:name "Cryptography"@en ;
    .

<http://viaf.org/viaf/54224429> # Jennifer Seberry
    a schema:Person ;
   schema:birthDate "1944" ;
   schema:familyName "Seberry" ;
   schema:givenName "Jennifer" ;
   schema:name "Jennifer Seberry" ;
    .

<http://viaf.org/viaf/85472982> # Yuliang Zheng
    a schema:Person ;
   schema:birthDate "1962" ;
   schema:familyName "Zheng" ;
   schema:givenName "Yuliang" ;
   schema:name "Yuliang Zheng" ;
    .

<http://worldcat.org/isbn/9780387572208>
    a schema:ProductModel ;
   schema:isbn "0387572201" ;
   schema:isbn "9780387572208" ;
    .

<http://worldcat.org/isbn/9783540572206>
    a schema:ProductModel ;
   schema:isbn "3540572201" ;
   schema:isbn "9783540572206" ;
    .

<http://www.worldcat.org/title/-/oclc/29186866>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/29186866> ; # Advances in cryptology--AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings
   schema:dateModified "2018-11-11" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.