Coverart for item
The Resource Advances in Cryptology — CRYPTO ’94 : 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings, edited by Yvo G. Desmedt, (electronic resource)

Advances in Cryptology — CRYPTO ’94 : 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings, edited by Yvo G. Desmedt, (electronic resource)

Label
Advances in Cryptology — CRYPTO ’94 : 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings
Title
Advances in Cryptology — CRYPTO ’94
Title remainder
14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings
Statement of responsibility
edited by Yvo G. Desmedt
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
This volume constitutes the proceedings of CRYPTO '94, the 14th International Cryptology Conference, held at Santa Barbara, CA, USA in August 1994 under the sponsorship of the International Association for Cryptologic Research (IACR). The proceedings contains revised versions of the 38 papers selected for presentation at the conference from a total of 114 submissions. All aspects of cryptologic research and advanced applications are addressed; in particular there are sections on block ciphers, signatures, implementation and hardware aspects, authentication and secret sharing, zero-knowledge, combinatorics, number theory, cryptanalysis and protocol failures, and secure computations and protocols
Member of
http://library.link/vocab/creatorName
Desmedt, Yvo G
Image bit depth
0
LC call number
QA76.9.A25
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
SpringerLink
Series statement
Lecture Notes in Computer Science,
Series volume
839
http://library.link/vocab/subjectName
  • Computer science
  • Computer Communication Networks
  • Operating systems (Computers)
  • Data encryption (Computer science)
  • Coding theory
  • Combinatorics
  • Computer Science
  • Data Encryption
  • Coding and Information Theory
  • Operating Systems
  • Combinatorics
  • Computer Communication Networks
Label
Advances in Cryptology — CRYPTO ’94 : 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings, edited by Yvo G. Desmedt, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Block Ciphers: Differential and Linear Cryptanalysis -- The First Experimental Cryptanalysis of the Data Encryption Standard -- Linear Cryptanalysis of the Fast Data Encipherment Algorithm -- Differential-Linear Cryptanalysis -- Linear Cryptanalysis Using Multiple Approximations -- Schemes Based on New Problems -- Hashing with SL 2 -- Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks -- Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders -- Signatures I -- Designated Confirmer Signatures and Public-Key Encryption are Equivalent -- Directed Acyclic Graphs, One-way Functions and Digital Signatures -- An Identity-Based Signature Scheme with Bounded Life-Span -- Implementation and Hardware Aspects -- More Flexible Exponentiation with Precomputation -- A Parallel Permutation Multiplier for a PGM Crypto-chip -- Cryptographic Randomness from Air Turbulence in Disk Drives -- Authentication and Secret Sharing -- Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol -- LFSR-based Hashing and Authentication -- New Bound on Authentication Code with Arbitration -- Multi-Secret Sharing Schemes -- Zero-Knowledge -- Designing Identification Schemes with Keys of Short Size -- Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols -- Language Dependent Secure Bit Commitment -- On the length of cryptographic hash-values used in identification schemes -- Signatures II -- Incremental Cryptography: The Case of Hashing and Signing -- An Efficient Existentially Unforgeable Signature Scheme and its Applications -- Combinatorics and its Applications -- Bounds for Resilient Functions and Orthogonal Arrays -- Tracing Traitors -- Number Theory -- Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms -- Fast Generation of Provable Primes Using Search in Arithmetic Progressions -- Cryptanalysis and Protocol Failures -- Attack on the Cryptographic Scheme NIKS-TAS -- On the Risk of Opening Distributed Keys -- Cryptanalysis of Cryptosystems based on Remote Chaos Replication -- Pseudo-Random Generation -- A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences -- Block Ciphers: Design and Cryptanalysis -- The Security of Cipher Block Chaining -- A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem -- Ciphertext Only Attack for One-way function of the MAP using One Ciphertext -- Pitfalls in Designing Substitution Boxes -- Secure Computations and Protocols -- A Randomness-Rounds Tradeoff in Private Computation -- Secure Voting Using Partially Compatible Homomorphisms -- Maintaining Security in the Presence of Transient Faults
Dimensions
unknown
Extent
XII, 438 p.
File format
multiple file formats
Form of item
electronic
Isbn
9783540486589
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/3-540-48658-5
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-48658-9
Label
Advances in Cryptology — CRYPTO ’94 : 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings, edited by Yvo G. Desmedt, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Block Ciphers: Differential and Linear Cryptanalysis -- The First Experimental Cryptanalysis of the Data Encryption Standard -- Linear Cryptanalysis of the Fast Data Encipherment Algorithm -- Differential-Linear Cryptanalysis -- Linear Cryptanalysis Using Multiple Approximations -- Schemes Based on New Problems -- Hashing with SL 2 -- Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks -- Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders -- Signatures I -- Designated Confirmer Signatures and Public-Key Encryption are Equivalent -- Directed Acyclic Graphs, One-way Functions and Digital Signatures -- An Identity-Based Signature Scheme with Bounded Life-Span -- Implementation and Hardware Aspects -- More Flexible Exponentiation with Precomputation -- A Parallel Permutation Multiplier for a PGM Crypto-chip -- Cryptographic Randomness from Air Turbulence in Disk Drives -- Authentication and Secret Sharing -- Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol -- LFSR-based Hashing and Authentication -- New Bound on Authentication Code with Arbitration -- Multi-Secret Sharing Schemes -- Zero-Knowledge -- Designing Identification Schemes with Keys of Short Size -- Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols -- Language Dependent Secure Bit Commitment -- On the length of cryptographic hash-values used in identification schemes -- Signatures II -- Incremental Cryptography: The Case of Hashing and Signing -- An Efficient Existentially Unforgeable Signature Scheme and its Applications -- Combinatorics and its Applications -- Bounds for Resilient Functions and Orthogonal Arrays -- Tracing Traitors -- Number Theory -- Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms -- Fast Generation of Provable Primes Using Search in Arithmetic Progressions -- Cryptanalysis and Protocol Failures -- Attack on the Cryptographic Scheme NIKS-TAS -- On the Risk of Opening Distributed Keys -- Cryptanalysis of Cryptosystems based on Remote Chaos Replication -- Pseudo-Random Generation -- A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences -- Block Ciphers: Design and Cryptanalysis -- The Security of Cipher Block Chaining -- A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem -- Ciphertext Only Attack for One-way function of the MAP using One Ciphertext -- Pitfalls in Designing Substitution Boxes -- Secure Computations and Protocols -- A Randomness-Rounds Tradeoff in Private Computation -- Secure Voting Using Partially Compatible Homomorphisms -- Maintaining Security in the Presence of Transient Faults
Dimensions
unknown
Extent
XII, 438 p.
File format
multiple file formats
Form of item
electronic
Isbn
9783540486589
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/3-540-48658-5
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-48658-9

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...