Borrow it
 African Studies Library
 Alumni Medical Library
 Astronomy Library
 Fineman and Pappas Law Libraries
 Frederick S. Pardee Management Library
 Howard Gotlieb Archival Research Center
 Mugar Memorial Library
 Music Library
 Pikering Educational Resources Library
 School of Theology Library
 Science & Engineering Library
 Stone Science Library
The Resource Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource)
Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource)
Resource Information
The item Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
 Summary
 This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 811, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on:  Publickey cryptosystems  Pseudorandomness and sequences  Network security  Authentication  Block ciphers  Zeroknowledge protocols  Theory  Applications  Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology
 Language
 eng
 Extent
 X, 462 p.
 Contents

 The implementation of elliptic curve cryptosystems
 Direct demonstration of the power to break publickey cryptosystems
 Continued fractions and the BerlekampMassey algorithm
 Nonlinear generators of binary sequences with controllable complexity and double key
 KM sequence is forwardly predictable
 Lower bounds on the weight complexities of cascaded binary sequences
 Secure user access control for public networks
 Formal specification and verification of secure communication protocols
 Network security policy models
 KEYMEX: An expert system for the design of key management schemes
 On the formal analysis of PKCS authentication protocols
 Some remarks on authentication systems
 Meetinthemiddle attack on digital signature schemes
 A binary sequence generator based on ZivLempel source coding
 A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
 Parallel generation of pseudorandom sequences
 Large primes in stream cipher cryptography
 Comparison of block ciphers
 Key scheduling in des type cryptosystems
 LOKI — A cryptographic primitive for authentication and secrecy applications
 Permutation generators of alternating groups
 Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms
 A (nonpractical) threepass identification protocol using coding theory
 Demonstrating possession without revealing factors and its application
 Anonymous onetime signatures and flexible untraceable electronic cash
 Dyadic matrices and their potential significance in cryptography (abstract)
 A note on strong Fibonacci pseudoprimes
 On the significance of the directed acyclic word graph in cryptology
 Solving equations in sequences
 The practical application of state of the art security in real environments
 RSA as a benchmark for multiprocessor machines
 Range equations and range matrices: a study in statistical database security
 Record encryption in distributed databases
 VLSI design for exponentiation in GF(2n)
 A fast modularmultiplication module for smart cards
 Minòs: Extended user authentication
 Universal logic sequences
 The three faces of information security
 Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system
 Isbn
 9783540462972
 Label
 Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings
 Title
 Advances in Cryptology — AUSCRYPT '90
 Title remainder
 International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings
 Statement of responsibility
 edited by Jennifer Seberry, Josef Pieprzyk
 Title variation
 Proceedings
 Subject

 Number theory
 Computer science
 Number theory
 Computer science
 Communications Engineering, Networks
 Number Theory
 Number Theory
 Combinatorics
 Computer Science
 Computer Science
 Coding theory
 Combinatorics
 Coding and Information Theory
 Electronic resources
 Telecommunication
 Coding theory
 Data encryption (Computer science)
 Combinatorics
 Coding theory
 Computer Communication Networks
 Data encryption (Computer science)
 Telecommunication
 Number theory
 Telecommunication
 Number Theory
 Computer Science
 Computer science
 Data Encryption
 Data encryption (Computer science)
 Language
 eng
 Summary
 This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 811, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on:  Publickey cryptosystems  Pseudorandomness and sequences  Network security  Authentication  Block ciphers  Zeroknowledge protocols  Theory  Applications  Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology
 http://library.link/vocab/creatorName
 Seberry, Jennifer
 Image bit depth
 0
 LC call number
 QA76.9.A25
 Literary form
 non fiction
 http://library.link/vocab/relatedWorkOrContributorName

 Pieprzyk, Josef.
 SpringerLink
 Series statement
 Lecture Notes in Computer Science,
 Series volume
 453
 http://library.link/vocab/subjectName

 Computer science
 Computer Communication Networks
 Data encryption (Computer science)
 Coding theory
 Combinatorics
 Number theory
 Telecommunication
 Computer Science
 Data Encryption
 Coding and Information Theory
 Computer Communication Networks
 Number Theory
 Combinatorics
 Communications Engineering, Networks
 Label
 Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 The implementation of elliptic curve cryptosystems  Direct demonstration of the power to break publickey cryptosystems  Continued fractions and the BerlekampMassey algorithm  Nonlinear generators of binary sequences with controllable complexity and double key  KM sequence is forwardly predictable  Lower bounds on the weight complexities of cascaded binary sequences  Secure user access control for public networks  Formal specification and verification of secure communication protocols  Network security policy models  KEYMEX: An expert system for the design of key management schemes  On the formal analysis of PKCS authentication protocols  Some remarks on authentication systems  Meetinthemiddle attack on digital signature schemes  A binary sequence generator based on ZivLempel source coding  A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence  Parallel generation of pseudorandom sequences  Large primes in stream cipher cryptography  Comparison of block ciphers  Key scheduling in des type cryptosystems  LOKI — A cryptographic primitive for authentication and secrecy applications  Permutation generators of alternating groups  Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms  A (nonpractical) threepass identification protocol using coding theory  Demonstrating possession without revealing factors and its application  Anonymous onetime signatures and flexible untraceable electronic cash  Dyadic matrices and their potential significance in cryptography (abstract)  A note on strong Fibonacci pseudoprimes  On the significance of the directed acyclic word graph in cryptology  Solving equations in sequences  The practical application of state of the art security in real environments  RSA as a benchmark for multiprocessor machines  Range equations and range matrices: a study in statistical database security  Record encryption in distributed databases  VLSI design for exponentiation in GF(2n)  A fast modularmultiplication module for smart cards  Minòs: Extended user authentication  Universal logic sequences  The three faces of information security  Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system
 Dimensions
 unknown
 Extent
 X, 462 p.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783540462972
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/BFb0030344
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783540462972
 Label
 Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 The implementation of elliptic curve cryptosystems  Direct demonstration of the power to break publickey cryptosystems  Continued fractions and the BerlekampMassey algorithm  Nonlinear generators of binary sequences with controllable complexity and double key  KM sequence is forwardly predictable  Lower bounds on the weight complexities of cascaded binary sequences  Secure user access control for public networks  Formal specification and verification of secure communication protocols  Network security policy models  KEYMEX: An expert system for the design of key management schemes  On the formal analysis of PKCS authentication protocols  Some remarks on authentication systems  Meetinthemiddle attack on digital signature schemes  A binary sequence generator based on ZivLempel source coding  A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence  Parallel generation of pseudorandom sequences  Large primes in stream cipher cryptography  Comparison of block ciphers  Key scheduling in des type cryptosystems  LOKI — A cryptographic primitive for authentication and secrecy applications  Permutation generators of alternating groups  Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms  A (nonpractical) threepass identification protocol using coding theory  Demonstrating possession without revealing factors and its application  Anonymous onetime signatures and flexible untraceable electronic cash  Dyadic matrices and their potential significance in cryptography (abstract)  A note on strong Fibonacci pseudoprimes  On the significance of the directed acyclic word graph in cryptology  Solving equations in sequences  The practical application of state of the art security in real environments  RSA as a benchmark for multiprocessor machines  Range equations and range matrices: a study in statistical database security  Record encryption in distributed databases  VLSI design for exponentiation in GF(2n)  A fast modularmultiplication module for smart cards  Minòs: Extended user authentication  Universal logic sequences  The three faces of information security  Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system
 Dimensions
 unknown
 Extent
 X, 462 p.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783540462972
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/BFb0030344
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783540462972
Subject
 Coding and Information Theory
 Coding theory
 Coding theory
 Coding theory
 Combinatorics
 Combinatorics
 Combinatorics
 Communications Engineering, Networks
 Computer Communication Networks
 Computer Science
 Computer Science
 Computer Science
 Computer science
 Computer science
 Computer science
 Data Encryption
 Data encryption (Computer science)
 Data encryption (Computer science)
 Data encryption (Computer science)
 Electronic resources
 Number Theory
 Number Theory
 Number Theory
 Number theory
 Number theory
 Number theory
 Telecommunication
 Telecommunication
 Telecommunication
Member of
Library Locations

African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 71.108227


Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 71.105717

Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 71.107023

Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 71.099547

Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 71.108227


Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 71.108227

Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 71.101425

School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 71.107235

Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 71.102257

Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94AUSCRYPT90/OEYxgYupPuQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94AUSCRYPT90/OEYxgYupPuQ/">Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94AUSCRYPT90/OEYxgYupPuQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94AUSCRYPT90/OEYxgYupPuQ/">Advances in Cryptology — AUSCRYPT '90 : International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings, edited by Jennifer Seberry, Josef Pieprzyk, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>