Borrow it
 African Studies Library
 Alumni Medical Library
 Astronomy Library
 Fineman and Pappas Law Libraries
 Frederick S. Pardee Management Library
 Howard Gotlieb Archival Research Center
 Mugar Memorial Library
 Music Library
 Pikering Educational Resources Library
 School of Theology Library
 Science & Engineering Library
 Stone Science Library
The Resource Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource)
Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource)
Resource Information
The item Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
 Summary
 This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DESlike cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers  foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers  foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session
 Language
 eng
 Extent
 XI, 505 p.
 Contents

 The transition from mechanisms to electronic computers, 1940 to 1950
 Cryptanalysis of LOKI
 Improving resistance to differential cryptanalysis and the redesign of LOKI
 A method to estimate the number of ciphertext pairs for differential cryptanalysis
 Construction of DESlike Sboxes based on Boolean functions satisfying the SAC
 The data base of selected permutations
 A framework for the design of oneway hash functions including cryptanalysis of Damgård's oneway function based on a cellular automaton
 How to construct a family of strong one way permutations
 On claw free families
 Sibling intractable function families and their applications
 A digital multisignature scheme based on the FiatShamir scheme
 A generalized secret sharing scheme with cheater detection
 Generalized threshold cryptosystems
 Feistel type authentication codes
 Research activities on cryptology in korea
 On necessary and sufficient conditions for the construction of super pseudorandom permutations
 A construction of a cipher from a single pseudorandom permutation
 Optimal perfect randomizers
 A general purpose technique for locating key scheduling weaknesses in DESlike cryptosystems
 Results of switchingclosuretest on FEAL
 ICcards and telecommunication services
 Cryptanalysis of several conference key distribution schemes
 Revealing information with partial period correlations (extended abstract)
 Extended majority voting and privatekey algebraiccode encryptions
 A secure analog speech scrambler using the discrete cosine transform
 An oblivious transfer protocol and its application for the exchange of secrets
 4 Move perfect ZKIP of knowledge with no assumption
 On the complexity of constant round ZKIP of possession of knowledge
 On the power of twolocal random reductions
 A note on oneprover, instancehiding zeroknowledge proof systems
 An efficient zeroknowledge scheme for the discrete logarithm based on smooth numbers
 An extension of zeroknowledge proofs and its applications
 Any language in IP has a divertible ZKIP
 A multipurpose proof system — for identity and membership proofs
 Formal verification of probabilistic properties in cryptographic protocols
 Cryptography and machine learning
 Speeding up prime number generation
 Two efficient serveraided secret computation protocols based on the addition sequence
 On ordinary elliptic curve cryptosystems
 Cryptanalysis of another knapsack cryptosystem
 Collisions for Schnorr's hash function FFTHash presented at Crypto '91
 On NIST's proposed digital signature standard
 A knownplaintext attack of FEAL4 based on the system of linear equations on difference
 Simultaneous attacks in differential cryptanalysis (getting more pairs per encryption)
 Privacy, cryptographic pseudonyms, and the state of health
 Limitations of the EvenMansour construction
 Isbn
 9783540480662
 Label
 Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings
 Title
 Advances in Cryptology — ASIACRYPT '91
 Title remainder
 International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings
 Statement of responsibility
 edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto
 Subject

 Combinatorics
 Computer science
 Computer science
 Coding theory
 Operating systems (Computers)
 Computer Science
 Computer Science
 Operating Systems
 Coding theory
 Coding theory
 Combinatorics
 Coding and Information Theory
 Electronic resources
 Operating systems (Computers)
 Operating systems (Computers)
 Computer Communication Networks
 Computer Science
 Computer science
 Data encryption (Computer science)
 Data Encryption
 Data encryption (Computer science)
 Language
 eng
 Summary
 This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DESlike cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers  foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers  foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session
 http://library.link/vocab/creatorName
 Imai, Hideki
 Image bit depth
 0
 LC call number
 QA76.9.A25
 Literary form
 non fiction
 http://library.link/vocab/relatedWorkOrContributorName

 Rivest, Ronald L.
 Matsumoto, Tsutomu.
 SpringerLink
 Series statement
 Lecture Notes in Computer Science,
 Series volume
 739
 http://library.link/vocab/subjectName

 Computer science
 Computer Communication Networks
 Operating systems (Computers)
 Data encryption (Computer science)
 Coding theory
 Combinatorics
 Computer Science
 Data Encryption
 Coding and Information Theory
 Operating Systems
 Combinatorics
 Computer Communication Networks
 Label
 Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 The transition from mechanisms to electronic computers, 1940 to 1950  Cryptanalysis of LOKI  Improving resistance to differential cryptanalysis and the redesign of LOKI  A method to estimate the number of ciphertext pairs for differential cryptanalysis  Construction of DESlike Sboxes based on Boolean functions satisfying the SAC  The data base of selected permutations  A framework for the design of oneway hash functions including cryptanalysis of Damgård's oneway function based on a cellular automaton  How to construct a family of strong one way permutations  On claw free families  Sibling intractable function families and their applications  A digital multisignature scheme based on the FiatShamir scheme  A generalized secret sharing scheme with cheater detection  Generalized threshold cryptosystems  Feistel type authentication codes  Research activities on cryptology in korea  On necessary and sufficient conditions for the construction of super pseudorandom permutations  A construction of a cipher from a single pseudorandom permutation  Optimal perfect randomizers  A general purpose technique for locating key scheduling weaknesses in DESlike cryptosystems  Results of switchingclosuretest on FEAL  ICcards and telecommunication services  Cryptanalysis of several conference key distribution schemes  Revealing information with partial period correlations (extended abstract)  Extended majority voting and privatekey algebraiccode encryptions  A secure analog speech scrambler using the discrete cosine transform  An oblivious transfer protocol and its application for the exchange of secrets  4 Move perfect ZKIP of knowledge with no assumption  On the complexity of constant round ZKIP of possession of knowledge  On the power of twolocal random reductions  A note on oneprover, instancehiding zeroknowledge proof systems  An efficient zeroknowledge scheme for the discrete logarithm based on smooth numbers  An extension of zeroknowledge proofs and its applications  Any language in IP has a divertible ZKIP  A multipurpose proof system — for identity and membership proofs  Formal verification of probabilistic properties in cryptographic protocols  Cryptography and machine learning  Speeding up prime number generation  Two efficient serveraided secret computation protocols based on the addition sequence  On ordinary elliptic curve cryptosystems  Cryptanalysis of another knapsack cryptosystem  Collisions for Schnorr's hash function FFTHash presented at Crypto '91  On NIST's proposed digital signature standard  A knownplaintext attack of FEAL4 based on the system of linear equations on difference  Simultaneous attacks in differential cryptanalysis (getting more pairs per encryption)  Privacy, cryptographic pseudonyms, and the state of health  Limitations of the EvenMansour construction
 Dimensions
 unknown
 Extent
 XI, 505 p.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783540480662
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/3540573321
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783540480662
 Label
 Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 The transition from mechanisms to electronic computers, 1940 to 1950  Cryptanalysis of LOKI  Improving resistance to differential cryptanalysis and the redesign of LOKI  A method to estimate the number of ciphertext pairs for differential cryptanalysis  Construction of DESlike Sboxes based on Boolean functions satisfying the SAC  The data base of selected permutations  A framework for the design of oneway hash functions including cryptanalysis of Damgård's oneway function based on a cellular automaton  How to construct a family of strong one way permutations  On claw free families  Sibling intractable function families and their applications  A digital multisignature scheme based on the FiatShamir scheme  A generalized secret sharing scheme with cheater detection  Generalized threshold cryptosystems  Feistel type authentication codes  Research activities on cryptology in korea  On necessary and sufficient conditions for the construction of super pseudorandom permutations  A construction of a cipher from a single pseudorandom permutation  Optimal perfect randomizers  A general purpose technique for locating key scheduling weaknesses in DESlike cryptosystems  Results of switchingclosuretest on FEAL  ICcards and telecommunication services  Cryptanalysis of several conference key distribution schemes  Revealing information with partial period correlations (extended abstract)  Extended majority voting and privatekey algebraiccode encryptions  A secure analog speech scrambler using the discrete cosine transform  An oblivious transfer protocol and its application for the exchange of secrets  4 Move perfect ZKIP of knowledge with no assumption  On the complexity of constant round ZKIP of possession of knowledge  On the power of twolocal random reductions  A note on oneprover, instancehiding zeroknowledge proof systems  An efficient zeroknowledge scheme for the discrete logarithm based on smooth numbers  An extension of zeroknowledge proofs and its applications  Any language in IP has a divertible ZKIP  A multipurpose proof system — for identity and membership proofs  Formal verification of probabilistic properties in cryptographic protocols  Cryptography and machine learning  Speeding up prime number generation  Two efficient serveraided secret computation protocols based on the addition sequence  On ordinary elliptic curve cryptosystems  Cryptanalysis of another knapsack cryptosystem  Collisions for Schnorr's hash function FFTHash presented at Crypto '91  On NIST's proposed digital signature standard  A knownplaintext attack of FEAL4 based on the system of linear equations on difference  Simultaneous attacks in differential cryptanalysis (getting more pairs per encryption)  Privacy, cryptographic pseudonyms, and the state of health  Limitations of the EvenMansour construction
 Dimensions
 unknown
 Extent
 XI, 505 p.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783540480662
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/3540573321
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783540480662
Subject
 Coding and Information Theory
 Coding theory
 Coding theory
 Coding theory
 Combinatorics
 Combinatorics
 Computer Communication Networks
 Computer Science
 Computer Science
 Computer Science
 Computer science
 Computer science
 Computer science
 Data Encryption
 Data encryption (Computer science)
 Data encryption (Computer science)
 Electronic resources
 Operating Systems
 Operating systems (Computers)
 Operating systems (Computers)
 Operating systems (Computers)
Member of
Library Locations

African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 71.108227


Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 71.105717

Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 71.107023

Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 71.099547

Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 71.108227


Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 71.108227

Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 71.101425

School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 71.107235

Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 71.102257

Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT91/WKKYS2LmZS8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT91/WKKYS2LmZS8/">Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT91/WKKYS2LmZS8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT91/WKKYS2LmZS8/">Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>