Coverart for item
The Resource Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource)

Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource)

Label
Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings
Title
Advances in Cryptology — ASIACRYPT '91
Title remainder
International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings
Statement of responsibility
edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DES-like cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers - foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers - foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session
Member of
http://library.link/vocab/creatorName
Imai, Hideki
Image bit depth
0
LC call number
QA76.9.A25
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
  • Rivest, Ronald L.
  • Matsumoto, Tsutomu.
  • SpringerLink
Series statement
Lecture Notes in Computer Science,
Series volume
739
http://library.link/vocab/subjectName
  • Computer science
  • Computer Communication Networks
  • Operating systems (Computers)
  • Data encryption (Computer science)
  • Coding theory
  • Combinatorics
  • Computer Science
  • Data Encryption
  • Coding and Information Theory
  • Operating Systems
  • Combinatorics
  • Computer Communication Networks
Label
Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
The transition from mechanisms to electronic computers, 1940 to 1950 -- Cryptanalysis of LOKI -- Improving resistance to differential cryptanalysis and the redesign of LOKI -- A method to estimate the number of ciphertext pairs for differential cryptanalysis -- Construction of DES-like S-boxes based on Boolean functions satisfying the SAC -- The data base of selected permutations -- A framework for the design of one-way hash functions including cryptanalysis of Damgård's one-way function based on a cellular automaton -- How to construct a family of strong one way permutations -- On claw free families -- Sibling intractable function families and their applications -- A digital multisignature scheme based on the Fiat-Shamir scheme -- A generalized secret sharing scheme with cheater detection -- Generalized threshold cryptosystems -- Feistel type authentication codes -- Research activities on cryptology in korea -- On necessary and sufficient conditions for the construction of super pseudorandom permutations -- A construction of a cipher from a single pseudorandom permutation -- Optimal perfect randomizers -- A general purpose technique for locating key scheduling weaknesses in DES-like cryptosystems -- Results of switching-closure-test on FEAL -- IC-cards and telecommunication services -- Cryptanalysis of several conference key distribution schemes -- Revealing information with partial period correlations (extended abstract) -- Extended majority voting and private-key algebraic-code encryptions -- A secure analog speech scrambler using the discrete cosine transform -- An oblivious transfer protocol and its application for the exchange of secrets -- 4 Move perfect ZKIP of knowledge with no assumption -- On the complexity of constant round ZKIP of possession of knowledge -- On the power of two-local random reductions -- A note on one-prover, instance-hiding zero-knowledge proof systems -- An efficient zero-knowledge scheme for the discrete logarithm based on smooth numbers -- An extension of zero-knowledge proofs and its applications -- Any language in IP has a divertible ZKIP -- A multi-purpose proof system — for identity and membership proofs -- Formal verification of probabilistic properties in cryptographic protocols -- Cryptography and machine learning -- Speeding up prime number generation -- Two efficient server-aided secret computation protocols based on the addition sequence -- On ordinary elliptic curve cryptosystems -- Cryptanalysis of another knapsack cryptosystem -- Collisions for Schnorr's hash function FFT-Hash presented at Crypto '91 -- On NIST's proposed digital signature standard -- A known-plaintext attack of FEAL-4 based on the system of linear equations on difference -- Simultaneous attacks in differential cryptanalysis (getting more pairs per encryption) -- Privacy, cryptographic pseudonyms, and the state of health -- Limitations of the Even-Mansour construction
Dimensions
unknown
Extent
XI, 505 p.
File format
multiple file formats
Form of item
electronic
Isbn
9783540480662
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/3-540-57332-1
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-48066-2
Label
Advances in Cryptology — ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings, edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
The transition from mechanisms to electronic computers, 1940 to 1950 -- Cryptanalysis of LOKI -- Improving resistance to differential cryptanalysis and the redesign of LOKI -- A method to estimate the number of ciphertext pairs for differential cryptanalysis -- Construction of DES-like S-boxes based on Boolean functions satisfying the SAC -- The data base of selected permutations -- A framework for the design of one-way hash functions including cryptanalysis of Damgård's one-way function based on a cellular automaton -- How to construct a family of strong one way permutations -- On claw free families -- Sibling intractable function families and their applications -- A digital multisignature scheme based on the Fiat-Shamir scheme -- A generalized secret sharing scheme with cheater detection -- Generalized threshold cryptosystems -- Feistel type authentication codes -- Research activities on cryptology in korea -- On necessary and sufficient conditions for the construction of super pseudorandom permutations -- A construction of a cipher from a single pseudorandom permutation -- Optimal perfect randomizers -- A general purpose technique for locating key scheduling weaknesses in DES-like cryptosystems -- Results of switching-closure-test on FEAL -- IC-cards and telecommunication services -- Cryptanalysis of several conference key distribution schemes -- Revealing information with partial period correlations (extended abstract) -- Extended majority voting and private-key algebraic-code encryptions -- A secure analog speech scrambler using the discrete cosine transform -- An oblivious transfer protocol and its application for the exchange of secrets -- 4 Move perfect ZKIP of knowledge with no assumption -- On the complexity of constant round ZKIP of possession of knowledge -- On the power of two-local random reductions -- A note on one-prover, instance-hiding zero-knowledge proof systems -- An efficient zero-knowledge scheme for the discrete logarithm based on smooth numbers -- An extension of zero-knowledge proofs and its applications -- Any language in IP has a divertible ZKIP -- A multi-purpose proof system — for identity and membership proofs -- Formal verification of probabilistic properties in cryptographic protocols -- Cryptography and machine learning -- Speeding up prime number generation -- Two efficient server-aided secret computation protocols based on the addition sequence -- On ordinary elliptic curve cryptosystems -- Cryptanalysis of another knapsack cryptosystem -- Collisions for Schnorr's hash function FFT-Hash presented at Crypto '91 -- On NIST's proposed digital signature standard -- A known-plaintext attack of FEAL-4 based on the system of linear equations on difference -- Simultaneous attacks in differential cryptanalysis (getting more pairs per encryption) -- Privacy, cryptographic pseudonyms, and the state of health -- Limitations of the Even-Mansour construction
Dimensions
unknown
Extent
XI, 505 p.
File format
multiple file formats
Form of item
electronic
Isbn
9783540480662
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/3-540-57332-1
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-48066-2

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...