Coverart for item
The Resource Advances in Cryptology — CRYPTO’ 93 : 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings, edited by Douglas R. Stinson, (electronic resource)

Advances in Cryptology — CRYPTO’ 93 : 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings, edited by Douglas R. Stinson, (electronic resource)

Label
Advances in Cryptology — CRYPTO’ 93 : 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings
Title
Advances in Cryptology — CRYPTO’ 93
Title remainder
13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings
Statement of responsibility
edited by Douglas R. Stinson
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
This volume contains the papers presented at the CRYPTO '93 conference. The conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom) and held in cooperation with the IEEE Computer Society. These proceedings contain revised versions of the 38 contributed talks, as well as two talks from the rump session. The papers are grouped into parts on: cryptosystems, stream ciphers and cryptographic functions, proof systems and zero-knowledge, secret sharing, number theory and algorithms, differential cryptanalysis, complexity theory, applications, authentication codes, hash functions, cryptanalysis, and key distribution
Member of
http://library.link/vocab/creatorName
Stinson, Douglas R
Image bit depth
0
LC call number
QA76.9.A25
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
SpringerLink
Series statement
Lecture Notes in Computer Science,
Series volume
773
http://library.link/vocab/subjectName
  • Computer science
  • Operating systems (Computers)
  • Data encryption (Computer science)
  • Coding theory
  • Combinatorics
  • Computer Science
  • Data Encryption
  • Coding and Information Theory
  • Combinatorics
  • Operating Systems
Label
Advances in Cryptology — CRYPTO’ 93 : 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings, edited by Douglas R. Stinson, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Cryptosystems -- Efficient Signature Schemes Based on Birational Permutations -- A new identification scheme based on syndrome decoding -- The Shrinking Generator -- Stream Ciphers and Cryptographic Functions -- An Integrity Check Value Algorithm for Stream Ciphers -- Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics -- Proof Systems and Zero-knowledge -- A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity -- Secret Sharing and Perfect Zero Knowledge -- One Message Proof Systems with Known Space Verifiers -- Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions -- Secret Sharing -- Fully Dynamic Secret Sharing Schemes -- Multisecret Threshold Schemes -- Secret Sharing Made Short -- Number Theory and Algorithms -- A Subexponential Algorithm for Discrete Logarithms over All Finite Fields -- An implementation of the general number field sieve -- On the factorization of RSA-120 -- Comparison of three modular reduction functions -- Differential Cryptanalysis -- Differential Cryptanalysis of Lucifer -- Differential Attack on Message Authentication Codes -- Cryptanalysis of the CFB mode of the DES with a reduced number of rounds -- Weak Keys for IDEA -- Complexity Theory -- Entity Authentication and Key Distribution -- On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures -- Joint Encryption and Message-Efficient Secure Computation -- Cryptographic Primitives Based on Hard Learning Problems -- Applications -- Extensions of Single-term Coins -- Untraceable Off-line Cash in Wallet with Observers -- Discreet Solitary Games -- Authentication Codes -- On Families of Hash Functions via Geometric Codes and Concatenation -- On the Construction of Perfect Authentication Codes that Permit Arbitration -- Codes for Interactive Authentication -- Hash Functions -- Hash functions based on block ciphers: a synthetic approach -- Security of Iterated Hash Functions Based on Block Ciphers -- Cryptanalysis -- Improved Algorithms for the Permuted Kernel Problem -- On the Distribution of Characteristics in Composite Permutations -- Remark on the Threshold RSA Signature Scheme -- Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks -- Attacks on the Birational Permutation Signature Schemes -- Key Distribution -- Interaction in Key Distribution Schemes -- Secret-Key Agreement without Public-Key Cryptography -- Broadcast Encryption
Dimensions
unknown
Extent
X, 491 p.
File format
multiple file formats
Form of item
electronic
Isbn
9783540483298
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/3-540-48329-2
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-48329-8
Label
Advances in Cryptology — CRYPTO’ 93 : 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings, edited by Douglas R. Stinson, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Cryptosystems -- Efficient Signature Schemes Based on Birational Permutations -- A new identification scheme based on syndrome decoding -- The Shrinking Generator -- Stream Ciphers and Cryptographic Functions -- An Integrity Check Value Algorithm for Stream Ciphers -- Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics -- Proof Systems and Zero-knowledge -- A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity -- Secret Sharing and Perfect Zero Knowledge -- One Message Proof Systems with Known Space Verifiers -- Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions -- Secret Sharing -- Fully Dynamic Secret Sharing Schemes -- Multisecret Threshold Schemes -- Secret Sharing Made Short -- Number Theory and Algorithms -- A Subexponential Algorithm for Discrete Logarithms over All Finite Fields -- An implementation of the general number field sieve -- On the factorization of RSA-120 -- Comparison of three modular reduction functions -- Differential Cryptanalysis -- Differential Cryptanalysis of Lucifer -- Differential Attack on Message Authentication Codes -- Cryptanalysis of the CFB mode of the DES with a reduced number of rounds -- Weak Keys for IDEA -- Complexity Theory -- Entity Authentication and Key Distribution -- On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures -- Joint Encryption and Message-Efficient Secure Computation -- Cryptographic Primitives Based on Hard Learning Problems -- Applications -- Extensions of Single-term Coins -- Untraceable Off-line Cash in Wallet with Observers -- Discreet Solitary Games -- Authentication Codes -- On Families of Hash Functions via Geometric Codes and Concatenation -- On the Construction of Perfect Authentication Codes that Permit Arbitration -- Codes for Interactive Authentication -- Hash Functions -- Hash functions based on block ciphers: a synthetic approach -- Security of Iterated Hash Functions Based on Block Ciphers -- Cryptanalysis -- Improved Algorithms for the Permuted Kernel Problem -- On the Distribution of Characteristics in Composite Permutations -- Remark on the Threshold RSA Signature Scheme -- Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks -- Attacks on the Birational Permutation Signature Schemes -- Key Distribution -- Interaction in Key Distribution Schemes -- Secret-Key Agreement without Public-Key Cryptography -- Broadcast Encryption
Dimensions
unknown
Extent
X, 491 p.
File format
multiple file formats
Form of item
electronic
Isbn
9783540483298
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/3-540-48329-2
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-48329-8

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...