Advances in cryptology - CRYPTO'89 : proceedings ; [a Conference on the Theory and Applications of Cryptology held at the University of California, Santa Barbara, August 20-24, 1989] (Book, 1990) []
skip to content
New coming soon
Advances in cryptology - CRYPTO'89 : proceedings ; [a Conference on the Theory and Applications of Cryptology held at the University of California, Santa Barbara, August 20-24, 1989]

Advances in cryptology - CRYPTO'89 : proceedings ; [a Conference on the Theory and Applications of Cryptology held at the University of California, Santa Barbara, August 20-24, 1989]

Author: Gilles Brassard; CRYPTO. <9, 1989, Santa Barbara, Calif.>.
Publisher: New York ; Heidelberg : Springer, 1990.
Series: Lecture notes in computer science, 435.
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats
Publication:Advances in Cryptology -- CRYPTO' 89 Proceedings.

Proceedings of the ninth CRYPTO meeting, devoted to all aspects of cryptologic research. Topics include cryptanalysis, signature, key management, security, computation methods, zero-knowledge and  Read more...

More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Genre/Form: Conference papers and proceedings
Material Type: Conference publication
Document Type: Book
All Authors / Contributors: Gilles Brassard; CRYPTO. <9, 1989, Santa Barbara, Calif.>.
ISBN: 3540973176 9783540973171 0387973176 9780387973173
OCLC Number: 311262621
In: Brassard, Gilles
Description: XIII, 634 Seiten : Diagramme.
Contents: Opening session.- Keying the German Navy's Enigma.- Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context.- On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs.- Why is cryptography harder than it looks?.- Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks.- The use of Encryption in Kerberos for Network Authentication.- UNIX Password Security - Ten Years Later.- Practical Problems with a Cryptographic Protection Scheme.- The Smart Diskette A Universal User Token and Personal Crypto-Engine.- Pseudo-randomness and Sequences.- On the Quadratic Spans of Periodic Sequences.- The Shortest Feedback Shift Register That Can Generate A Given Sequence.- Perfect Local Randomness in Pseudo-random Sequences.- Sparse Pseudorandom Distributions.- Bit Commitment Using Pseudo-Randomness.- Cryptanalysis and Implementation.- How to Predict Congruential Generators.- A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang.- On the Linear Consistency Test (LCT) in Cryptanalysis with Applications.- Batch RSA.- On the Implementation of Elliptic Curve Cryptosystems.- Signature and Authentication I.- New Paradigms for Digital Signatures and Message Authentication Based on Non-Interactive Zero Knowledge Proofs.- Undeniable Signatures.- Signature and Authentication II.- A Certified Digital Signature.- Efficient Identification and Signatures for Smart Cards.- A signature with shared verification scheme.- On-Line/Off-Line Digital Signatures.- Threshold schemes and Key management.- On the Classification of Ideal Secret Sharing Schemes.- Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimensional Linear Space.- Secret Sharing Over Infinite Domains.- Threshold cryptosystems.- Flexible Access Control with Master Keys.- Key distribution and Network security.- Key Distribution Protocol for Digital Mobile Communication Systems.- A key exchange system based on real quadratic fields Extended abstract.- On Key Distribution Systems.- SDNS Architecture and End-to-end Encryption.- Fast computation.- A Survey of Hardware Implementations of RSA.- Modular Exponentiation Using Recursive Sums of Residues.- A Fast Modular-multiplication Algorithm based on a Higher Radix.- Addition Chain Heuristics.- How easy is collision search. New results and applications to DES.- Odds and ends.- A Design Principle for Hash Functions.- One Way Hash Functions and DES.- Properties of Cryptosystem PGM.- On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.- Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash.- Zero-knowledge and Oblivious transfer.- Efficient Identification Schemes Using Two Prover Interactive Proofs.- On the concrete complexity of zero-knowledge proofs.- Zero Knowledge Proofs of Knowledge in Two Rounds.- Minimum Resource Zero-Knowledge Proofs.- Non-Interactive Oblivious Transfer and Applications.- Multiparty computation.- Multiparty Protocols Tolerating Half Faulty Processors.- Controlled Gradual Disclosure Schemes for Random Bits and Their Applications.- Multiparty Computation with Faulty Majority.- The Spymasters Double-Agent Problem.- Impromptu talks.- On the Structure of Secret Key Exchange Protocols.- An Efficient Identification Scheme Based on Permuted Kernels (extended abstract).- An Efficient Software Protection Scheme.- Good S-Boxes Are Easy To Find.- Covert Distributed Processing with Computer Viruses.- Progress in Data Security Standardisation.- The FEAL-8 Cryptosystem and a Call for Attack.- How to Explain Zero-Knowledge Protocols to Your Children.
Series Title: Lecture notes in computer science, 435.
Responsibility: G. Brassard (ed.).


Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.