The Resource Advances in Cryptology — CRYPTO ’91 : Proceedings, edited by Joan Feigenbaum, (electronic resource)

Advances in Cryptology — CRYPTO ’91 : Proceedings, edited by Joan Feigenbaum, (electronic resource)

Label
Advances in Cryptology — CRYPTO ’91 : Proceedings
Title
Advances in Cryptology — CRYPTO ’91
Title remainder
Proceedings
Statement of responsibility
edited by Joan Feigenbaum
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
Crypto '91 was the eleventh in a series of workshops on cryptology sponsoredby the International Association for Cryptologic Research and was held in Santa Barbara, California, in August 1991. This volume contains a full paper or an extended abstract for each of the 39 talks presented at the workshop. All theoretical and practical aspects of cryptology are represented, including: protocol design and analysis, combinatorics and authentication, secret sharing and information theory, cryptanalysis, complexity theory, cryptographic schemas based on number theory, pseudorandomness, applications and implementations, viruses, public-key cryptosystems, and digital signatures
Member of
http://library.link/vocab/creatorName
Feigenbaum, Joan
Image bit depth
0
LC call number
QA76.9.A25
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
SpringerLink
Series statement
Lecture Notes in Computer Science,
Series volume
576
http://library.link/vocab/subjectName
  • Computer science
  • Data encryption (Computer science)
  • Computer Science
  • Data Encryption
Label
Advances in Cryptology — CRYPTO ’91 : Proceedings, edited by Joan Feigenbaum, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Protocol Design and Analysis -- A Calculus for Access Control in Distributed Systems -- Deriving the Complete Knowledge of Participants in Cryptographic Protocols -- Systematic Design of Two-Party Authentication Protocols -- Combinatorics and Authentication -- Combinatorial characterizations of authentication codes -- Universal hashing and authentication codes -- On Correlation-immune functions -- Secret Sharing and Information Theory -- On the Size of Shares for Secret Sharing Schemes -- On Verification in Secret Sharing -- Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing -- Multiparty Secret Key Exchange Using a Random Deal of Cards -- Cryptanalysis -- Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer -- A Known Plaintext Attack of FEAL-4 and FEAL-6 -- A switching closure test to analyze cryptosystems -- An Attack on the Last Two Rounds of MD4 -- The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks -- Complexity Theory -- A One-Round, Two-Prover, Zero-Knowledge Protocol for NP -- Interactive Proofs with Space Bounded Provers -- Functional Inversion and Communication Complexity -- The Use of Interaction in Public Cryptosystems. -- Cryptographic Schemes Based on Number Theory -- New Public-Key Schemes Based on Elliptic Curves over the Ring Zn -- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems -- CM-Curves with Good Cryptographic Properties -- A New ID-Based Key Sharing System -- Pseudorandomness -- Pseudo-random Generators from One-way Functions -- New Results on Pseudorandom Permutation Generators Based on the Des Scheme -- Applications and Implementations -- Faster Modular Multiplication by Operand Scaling -- Universal Electronic Cash -- How to Break and Repair a “Provably Secure” Untraceable Payment System -- Practical Quantum Oblivious Transfer -- Exploiting Parallelism in Hardware Implementation of the DES -- Secure Computation Protocols -- Foundations of Secure Interactive Computing -- Secure Computation -- A Cryptographic Scheme for Computerized General Elections -- Efficient Multiparty Protocols Using Circuit Randomization -- Public-Key Cryptosystems and Signatures -- Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack -- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks -- Shared generation of authenticators and signatures -- Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer
Dimensions
unknown
Extent
X, 484 p.
File format
multiple file formats
Form of item
electronic
Isbn
9783540467663
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/3-540-46766-1
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-46766-3
Label
Advances in Cryptology — CRYPTO ’91 : Proceedings, edited by Joan Feigenbaum, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Protocol Design and Analysis -- A Calculus for Access Control in Distributed Systems -- Deriving the Complete Knowledge of Participants in Cryptographic Protocols -- Systematic Design of Two-Party Authentication Protocols -- Combinatorics and Authentication -- Combinatorial characterizations of authentication codes -- Universal hashing and authentication codes -- On Correlation-immune functions -- Secret Sharing and Information Theory -- On the Size of Shares for Secret Sharing Schemes -- On Verification in Secret Sharing -- Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing -- Multiparty Secret Key Exchange Using a Random Deal of Cards -- Cryptanalysis -- Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer -- A Known Plaintext Attack of FEAL-4 and FEAL-6 -- A switching closure test to analyze cryptosystems -- An Attack on the Last Two Rounds of MD4 -- The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks -- Complexity Theory -- A One-Round, Two-Prover, Zero-Knowledge Protocol for NP -- Interactive Proofs with Space Bounded Provers -- Functional Inversion and Communication Complexity -- The Use of Interaction in Public Cryptosystems. -- Cryptographic Schemes Based on Number Theory -- New Public-Key Schemes Based on Elliptic Curves over the Ring Zn -- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems -- CM-Curves with Good Cryptographic Properties -- A New ID-Based Key Sharing System -- Pseudorandomness -- Pseudo-random Generators from One-way Functions -- New Results on Pseudorandom Permutation Generators Based on the Des Scheme -- Applications and Implementations -- Faster Modular Multiplication by Operand Scaling -- Universal Electronic Cash -- How to Break and Repair a “Provably Secure” Untraceable Payment System -- Practical Quantum Oblivious Transfer -- Exploiting Parallelism in Hardware Implementation of the DES -- Secure Computation Protocols -- Foundations of Secure Interactive Computing -- Secure Computation -- A Cryptographic Scheme for Computerized General Elections -- Efficient Multiparty Protocols Using Circuit Randomization -- Public-Key Cryptosystems and Signatures -- Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack -- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks -- Shared generation of authenticators and signatures -- Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer
Dimensions
unknown
Extent
X, 484 p.
File format
multiple file formats
Form of item
electronic
Isbn
9783540467663
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/3-540-46766-1
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-46766-3

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...