Borrow it
 African Studies Library
 Alumni Medical Library
 Astronomy Library
 Fineman and Pappas Law Libraries
 Frederick S. Pardee Management Library
 Howard Gotlieb Archival Research Center
 Mugar Memorial Library
 Music Library
 Pikering Educational Resources Library
 School of Theology Library
 Science & Engineering Library
 Stone Science Library
The Resource Advances in Cryptology — EUROCRYPT ’91 : Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings, edited by Donald W. Davies, (electronic resource)
Advances in Cryptology — EUROCRYPT ’91 : Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings, edited by Donald W. Davies, (electronic resource)
Resource Information
The item Advances in Cryptology — EUROCRYPT ’91 : Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings, edited by Donald W. Davies, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Advances in Cryptology — EUROCRYPT ’91 : Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings, edited by Donald W. Davies, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
 Summary
 This proceedings volume contains revised versions of papers presented at an open workshop on modern cryptology held in Brighton, UK, April 1991. The workshop was the latest in a series of workshops on cryptology which began in Santa Barbara in 1981 and was followed by a European counterpart in 1982. Following the tradition of the series, papers were invited in the form of extended abstracts and were reviewed by the programme committee, which selected those to be presented. After the meeting, the full papers were produced which form the main part of the volume. The papers are organized into sections on cryptanalysis, zero knowledge and oblivious transfer, sequences, signatures, theory, Sbox criteria, applications, and public key cryptography, and a section containing short "rump session" papers
 Language
 eng
 Extent
 XII, 556 pp.
 Contents

 Cryptanalysis I
 Differential Cryptanalysis of Feal and NHash
 Markov Ciphers and Differential Cryptanalysis
 The Knapsack Hash Function proposed at Crypto’89 can be broken
 Cryptanalysis II
 An Improved LowDensity Subset Sum Algorithm
 Cryptanalysis of McEliece’s PublicKey Cryptosystem
 On the Security of the Schnorr Scheme using Preprocessing
 Zero Knowledge and Oblivious Transfer
 Broadcast Interactive Proofs
 Direct Zero Knowledge Proofs of Computational Power in Five Rounds
 On the Reversibility of Oblivious Transfer
 Sequences I
 ZivLempel Complexity for Periodic Sequences and its Cryptographic Application
 A Secret Key Cryptosystem by Iterating a Chaotic Map
 Boolean Functions Satisfying Higher Order Propagation Criteria
 Sequences II
 The Maximum Order Complexity of Sequence Ensembles
 The Number of Output Sequences of a Binary Sequence Generator
 Linear Complexity of Periodically Repeated Random Sequences
 Sequences III
 On A Fast Correlation Attack on Certain Stream Ciphers
 Analysis of Pseudo Random Sequences Generated by Cellular Automata
 On Binary Sequences from Recursions “modulo 2e” Made NonLinear by the BitByBit “XOR” Function
 Signatures
 Weaknesses of Undeniable Signature Schemes
 Distributed Provers with Applications to Undeniable Signatures
 Interactive BiProof Systems and Undeniable Signature Schemes
 Group Signatures
 Theory I
 Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects
 Factoring Integers and Computing Discrete Logarithms via Diophantine Approximation
 Some Considerations concerning the Selection of RSA Moduli
 On the Use of Interconnection Networks in Cryptography
 Theory II
 Non Supersingular Elliptic Curves for Public Key Cryptosystems
 Building Cyclic Elliptic Curves Modulo Large Primes
 On the Complexity of Hyperelliptic Discrete Logarithm Problem
 SBox Criteria
 An Expanded Set of Sbox Design Criteria Based on Information Theory and its Relation to DifferentialLike Attacks
 Enumerating Nondegenerate Permutations
 Perfect nonlinear Sboxes
 Applications I
 A Formal Approach to Security Architectures
 Discrete Logarithm Based Protocols
 Human Identification Through Insecure Channel
 The Automated Cryptanalysis of Analog Speech Scramblers
 Applications II
 A Construction for One Way Hash Functions and Pseudorandom Bit Generators
 ESIGN: An Efficient Digital Signature Implementation for Smart Cards
 New Approaches to the Design of SelfSynchronizing Stream Ciphers
 Randomized Authentication Systems
 Public Key Cryptography
 Ideals over a NonCommutative Ring and their Application in Cryptology
 Selfcertified public keys
 Noninteractive PublicKey Cryptography
 Short Papers presented at the “Rump Session”
 Hash Functions And Graphs With Large Girths
 Dickson Pseudoprimes and Primality Testing
 Equivalent Goppa Codes and Trapdoors to McEliece’s Public Key Cryptosystem
 A Threshold Cryptosystem without a Trusted Party
 A Comparison of Cryptanalytic Principles Based on Iterative ErrorCorrection
 Cryptanalysis of the ChaoticMap Cryptosystem Suggested at EUROCRYPT’91
 How To Broadcast A Secret
 Probabilistic Analysis of Elementary Randomizers
 Race Integrity Primitives Evaluation (RIPE): A status report
 The Information Leakage through a Randomly Generated Function
 Some Weaknesses of “Weaknesses of Undeniable Signatures”
 Isbn
 9783540464167
 Label
 Advances in Cryptology — EUROCRYPT ’91 : Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings
 Title
 Advances in Cryptology — EUROCRYPT ’91
 Title remainder
 Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings
 Statement of responsibility
 edited by Donald W. Davies
 Subject

 Computer science
 Database management
 Computer science
 Operating systems (Computers)
 Combinatorics
 Operating systems (Computers)
 Computer Science
 Operating Systems
 Computer Science
 Coding theory
 Database management
 Combinatorics
 Coding and Information Theory
 Operating systems (Computers)
 Electronic resources
 Coding theory
 Data encryption (Computer science)
 Database Management
 Database Management
 Combinatorics
 Coding theory
 Data encryption (Computer science)
 Database management
 Computer Science
 Computer science
 Database Management
 Data Encryption
 Data encryption (Computer science)
 Language
 eng
 Summary
 This proceedings volume contains revised versions of papers presented at an open workshop on modern cryptology held in Brighton, UK, April 1991. The workshop was the latest in a series of workshops on cryptology which began in Santa Barbara in 1981 and was followed by a European counterpart in 1982. Following the tradition of the series, papers were invited in the form of extended abstracts and were reviewed by the programme committee, which selected those to be presented. After the meeting, the full papers were produced which form the main part of the volume. The papers are organized into sections on cryptanalysis, zero knowledge and oblivious transfer, sequences, signatures, theory, Sbox criteria, applications, and public key cryptography, and a section containing short "rump session" papers
 http://library.link/vocab/creatorName
 Davies, Donald W
 Image bit depth
 0
 LC call number
 QA76.9.A25
 Literary form
 non fiction
 http://library.link/vocab/relatedWorkOrContributorName
 SpringerLink
 Series statement
 Lecture Notes in Computer Science,
 Series volume
 547
 http://library.link/vocab/subjectName

 Computer science
 Operating systems (Computers)
 Data encryption (Computer science)
 Coding theory
 Database management
 Combinatorics
 Computer Science
 Data Encryption
 Coding and Information Theory
 Database Management
 Combinatorics
 Operating Systems
 Label
 Advances in Cryptology — EUROCRYPT ’91 : Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings, edited by Donald W. Davies, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 Cryptanalysis I  Differential Cryptanalysis of Feal and NHash  Markov Ciphers and Differential Cryptanalysis  The Knapsack Hash Function proposed at Crypto’89 can be broken  Cryptanalysis II  An Improved LowDensity Subset Sum Algorithm  Cryptanalysis of McEliece’s PublicKey Cryptosystem  On the Security of the Schnorr Scheme using Preprocessing  Zero Knowledge and Oblivious Transfer  Broadcast Interactive Proofs  Direct Zero Knowledge Proofs of Computational Power in Five Rounds  On the Reversibility of Oblivious Transfer  Sequences I  ZivLempel Complexity for Periodic Sequences and its Cryptographic Application  A Secret Key Cryptosystem by Iterating a Chaotic Map  Boolean Functions Satisfying Higher Order Propagation Criteria  Sequences II  The Maximum Order Complexity of Sequence Ensembles  The Number of Output Sequences of a Binary Sequence Generator  Linear Complexity of Periodically Repeated Random Sequences  Sequences III  On A Fast Correlation Attack on Certain Stream Ciphers  Analysis of Pseudo Random Sequences Generated by Cellular Automata  On Binary Sequences from Recursions “modulo 2e” Made NonLinear by the BitByBit “XOR” Function  Signatures  Weaknesses of Undeniable Signature Schemes  Distributed Provers with Applications to Undeniable Signatures  Interactive BiProof Systems and Undeniable Signature Schemes  Group Signatures  Theory I  Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects  Factoring Integers and Computing Discrete Logarithms via Diophantine Approximation  Some Considerations concerning the Selection of RSA Moduli  On the Use of Interconnection Networks in Cryptography  Theory II  Non Supersingular Elliptic Curves for Public Key Cryptosystems  Building Cyclic Elliptic Curves Modulo Large Primes  On the Complexity of Hyperelliptic Discrete Logarithm Problem  SBox Criteria  An Expanded Set of Sbox Design Criteria Based on Information Theory and its Relation to DifferentialLike Attacks  Enumerating Nondegenerate Permutations  Perfect nonlinear Sboxes  Applications I  A Formal Approach to Security Architectures  Discrete Logarithm Based Protocols  Human Identification Through Insecure Channel  The Automated Cryptanalysis of Analog Speech Scramblers  Applications II  A Construction for One Way Hash Functions and Pseudorandom Bit Generators  ESIGN: An Efficient Digital Signature Implementation for Smart Cards  New Approaches to the Design of SelfSynchronizing Stream Ciphers  Randomized Authentication Systems  Public Key Cryptography  Ideals over a NonCommutative Ring and their Application in Cryptology  Selfcertified public keys  Noninteractive PublicKey Cryptography  Short Papers presented at the “Rump Session”  Hash Functions And Graphs With Large Girths  Dickson Pseudoprimes and Primality Testing  Equivalent Goppa Codes and Trapdoors to McEliece’s Public Key Cryptosystem  A Threshold Cryptosystem without a Trusted Party  A Comparison of Cryptanalytic Principles Based on Iterative ErrorCorrection  Cryptanalysis of the ChaoticMap Cryptosystem Suggested at EUROCRYPT’91  How To Broadcast A Secret  Probabilistic Analysis of Elementary Randomizers  Race Integrity Primitives Evaluation (RIPE): A status report  The Information Leakage through a Randomly Generated Function  Some Weaknesses of “Weaknesses of Undeniable Signatures”
 Dimensions
 unknown
 Extent
 XII, 556 pp.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783540464167
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/3540464166
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783540464167
 Label
 Advances in Cryptology — EUROCRYPT ’91 : Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings, edited by Donald W. Davies, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 Cryptanalysis I  Differential Cryptanalysis of Feal and NHash  Markov Ciphers and Differential Cryptanalysis  The Knapsack Hash Function proposed at Crypto’89 can be broken  Cryptanalysis II  An Improved LowDensity Subset Sum Algorithm  Cryptanalysis of McEliece’s PublicKey Cryptosystem  On the Security of the Schnorr Scheme using Preprocessing  Zero Knowledge and Oblivious Transfer  Broadcast Interactive Proofs  Direct Zero Knowledge Proofs of Computational Power in Five Rounds  On the Reversibility of Oblivious Transfer  Sequences I  ZivLempel Complexity for Periodic Sequences and its Cryptographic Application  A Secret Key Cryptosystem by Iterating a Chaotic Map  Boolean Functions Satisfying Higher Order Propagation Criteria  Sequences II  The Maximum Order Complexity of Sequence Ensembles  The Number of Output Sequences of a Binary Sequence Generator  Linear Complexity of Periodically Repeated Random Sequences  Sequences III  On A Fast Correlation Attack on Certain Stream Ciphers  Analysis of Pseudo Random Sequences Generated by Cellular Automata  On Binary Sequences from Recursions “modulo 2e” Made NonLinear by the BitByBit “XOR” Function  Signatures  Weaknesses of Undeniable Signature Schemes  Distributed Provers with Applications to Undeniable Signatures  Interactive BiProof Systems and Undeniable Signature Schemes  Group Signatures  Theory I  Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects  Factoring Integers and Computing Discrete Logarithms via Diophantine Approximation  Some Considerations concerning the Selection of RSA Moduli  On the Use of Interconnection Networks in Cryptography  Theory II  Non Supersingular Elliptic Curves for Public Key Cryptosystems  Building Cyclic Elliptic Curves Modulo Large Primes  On the Complexity of Hyperelliptic Discrete Logarithm Problem  SBox Criteria  An Expanded Set of Sbox Design Criteria Based on Information Theory and its Relation to DifferentialLike Attacks  Enumerating Nondegenerate Permutations  Perfect nonlinear Sboxes  Applications I  A Formal Approach to Security Architectures  Discrete Logarithm Based Protocols  Human Identification Through Insecure Channel  The Automated Cryptanalysis of Analog Speech Scramblers  Applications II  A Construction for One Way Hash Functions and Pseudorandom Bit Generators  ESIGN: An Efficient Digital Signature Implementation for Smart Cards  New Approaches to the Design of SelfSynchronizing Stream Ciphers  Randomized Authentication Systems  Public Key Cryptography  Ideals over a NonCommutative Ring and their Application in Cryptology  Selfcertified public keys  Noninteractive PublicKey Cryptography  Short Papers presented at the “Rump Session”  Hash Functions And Graphs With Large Girths  Dickson Pseudoprimes and Primality Testing  Equivalent Goppa Codes and Trapdoors to McEliece’s Public Key Cryptosystem  A Threshold Cryptosystem without a Trusted Party  A Comparison of Cryptanalytic Principles Based on Iterative ErrorCorrection  Cryptanalysis of the ChaoticMap Cryptosystem Suggested at EUROCRYPT’91  How To Broadcast A Secret  Probabilistic Analysis of Elementary Randomizers  Race Integrity Primitives Evaluation (RIPE): A status report  The Information Leakage through a Randomly Generated Function  Some Weaknesses of “Weaknesses of Undeniable Signatures”
 Dimensions
 unknown
 Extent
 XII, 556 pp.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783540464167
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/3540464166
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783540464167
Subject
 Coding and Information Theory
 Coding theory
 Coding theory
 Coding theory
 Combinatorics
 Combinatorics
 Combinatorics
 Computer Science
 Computer Science
 Computer Science
 Computer science
 Computer science
 Computer science
 Data Encryption
 Data encryption (Computer science)
 Data encryption (Computer science)
 Data encryption (Computer science)
 Database Management
 Database Management
 Database Management
 Database management
 Database management
 Database management
 Electronic resources
 Operating Systems
 Operating systems (Computers)
 Operating systems (Computers)
 Operating systems (Computers)
Member of
Library Locations

African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 71.108227


Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 71.105717

Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 71.107023

Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 71.099547

Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 71.108227


Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 71.108227

Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 71.101425

School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 71.107235

Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 71.102257

Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94EUROCRYPT%E2%80%9991Workshop/n2I5zayKpu8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94EUROCRYPT%E2%80%9991Workshop/n2I5zayKpu8/">Advances in Cryptology — EUROCRYPT ’91 : Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings, edited by Donald W. Davies, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Advances in Cryptology — EUROCRYPT ’91 : Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings, edited by Donald W. Davies, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94EUROCRYPT%E2%80%9991Workshop/n2I5zayKpu8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94EUROCRYPT%E2%80%9991Workshop/n2I5zayKpu8/">Advances in Cryptology — EUROCRYPT ’91 : Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings, edited by Donald W. Davies, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>