Coverart for item
The Resource Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource)

Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource)

Label
Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings
Title
Advances in Cryptology — AUSCRYPT '90
Title remainder
International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings
Statement of responsibility
edited by Jennifer Seberry, Josef Pieprzyk
Title variation
Proceedings
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology
Member of
http://library.link/vocab/creatorName
Seberry, Jennifer
Image bit depth
0
LC call number
QA76.9.A25
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
  • Pieprzyk, Josef.
  • SpringerLink
Series statement
Lecture Notes in Computer Science,
Series volume
453
http://library.link/vocab/subjectName
  • Computer science
  • Computer Communication Networks
  • Data encryption (Computer science)
  • Coding theory
  • Combinatorics
  • Number theory
  • Telecommunication
  • Computer Science
  • Data Encryption
  • Coding and Information Theory
  • Computer Communication Networks
  • Number Theory
  • Combinatorics
  • Communications Engineering, Networks
Label
Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
The implementation of elliptic curve cryptosystems -- Direct demonstration of the power to break public-key cryptosystems -- Continued fractions and the Berlekamp-Massey algorithm -- Nonlinear generators of binary sequences with controllable complexity and double key -- K-M sequence is forwardly predictable -- Lower bounds on the weight complexities of cascaded binary sequences -- Secure user access control for public networks -- Formal specification and verification of secure communication protocols -- Network security policy models -- KEYMEX: An expert system for the design of key management schemes -- On the formal analysis of PKCS authentication protocols -- Some remarks on authentication systems -- Meet-in-the-middle attack on digital signature schemes -- A binary sequence generator based on Ziv-Lempel source coding -- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence -- Parallel generation of pseudo-random sequences -- Large primes in stream cipher cryptography -- Comparison of block ciphers -- Key scheduling in des type cryptosystems -- LOKI — A cryptographic primitive for authentication and secrecy applications -- Permutation generators of alternating groups -- Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms -- A (non-practical) three-pass identification protocol using coding theory -- Demonstrating possession without revealing factors and its application -- Anonymous one-time signatures and flexible untraceable electronic cash -- Dyadic matrices and their potential significance in cryptography (abstract) -- A note on strong Fibonacci pseudoprimes -- On the significance of the directed acyclic word graph in cryptology -- Solving equations in sequences -- The practical application of state of the art security in real environments -- RSA as a benchmark for multiprocessor machines -- Range equations and range matrices: a study in statistical database security -- Record encryption in distributed databases -- VLSI design for exponentiation in GF(2n) -- A fast modular-multiplication module for smart cards -- Minòs: Extended user authentication -- Universal logic sequences -- The three faces of information security -- Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system
Dimensions
unknown
Extent
X, 462 p.
File format
multiple file formats
Form of item
electronic
Isbn
9783540462972
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/BFb0030344
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-46297-2
Label
Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
The implementation of elliptic curve cryptosystems -- Direct demonstration of the power to break public-key cryptosystems -- Continued fractions and the Berlekamp-Massey algorithm -- Nonlinear generators of binary sequences with controllable complexity and double key -- K-M sequence is forwardly predictable -- Lower bounds on the weight complexities of cascaded binary sequences -- Secure user access control for public networks -- Formal specification and verification of secure communication protocols -- Network security policy models -- KEYMEX: An expert system for the design of key management schemes -- On the formal analysis of PKCS authentication protocols -- Some remarks on authentication systems -- Meet-in-the-middle attack on digital signature schemes -- A binary sequence generator based on Ziv-Lempel source coding -- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence -- Parallel generation of pseudo-random sequences -- Large primes in stream cipher cryptography -- Comparison of block ciphers -- Key scheduling in des type cryptosystems -- LOKI — A cryptographic primitive for authentication and secrecy applications -- Permutation generators of alternating groups -- Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms -- A (non-practical) three-pass identification protocol using coding theory -- Demonstrating possession without revealing factors and its application -- Anonymous one-time signatures and flexible untraceable electronic cash -- Dyadic matrices and their potential significance in cryptography (abstract) -- A note on strong Fibonacci pseudoprimes -- On the significance of the directed acyclic word graph in cryptology -- Solving equations in sequences -- The practical application of state of the art security in real environments -- RSA as a benchmark for multiprocessor machines -- Range equations and range matrices: a study in statistical database security -- Record encryption in distributed databases -- VLSI design for exponentiation in GF(2n) -- A fast modular-multiplication module for smart cards -- Minòs: Extended user authentication -- Universal logic sequences -- The three faces of information security -- Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system
Dimensions
unknown
Extent
X, 462 p.
File format
multiple file formats
Form of item
electronic
Isbn
9783540462972
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/BFb0030344
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-46297-2

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...