The Resource Advances in cryptology--CRYPTO '86 : proceedings, A.M. Odlyzko (ed.), (electronic resource)

Advances in cryptology--CRYPTO '86 : proceedings, A.M. Odlyzko (ed.), (electronic resource)

Label
Advances in cryptology--CRYPTO '86 : proceedings
Title
Advances in cryptology--CRYPTO '86
Title remainder
proceedings
Statement of responsibility
A.M. Odlyzko (ed.)
Title variation
CRYPTO '86
Creator
Contributor
Provider
Subject
Genre
Language
eng
Summary
This volume contains the proceedings of CRYPTO 86, one in a series of annual conferences at the University of California at Santa Barbara devoted to cryptologic research. The papers are presented in seven sections containing most of the presentations in the regular program, and a final section based on some informal presentations at a "Rump Session". The volume presents a very comprehensive picture of the latest public research in cryptography. Together with the proceedings of the previous Crypto and Eurocrypt meetings, it forms a set of indispensable reference works in this area. Of particular interest in this volume is the extensive section on zero-knoewledge proofs, which are a significant new development. This volume is intended for all those whose main interest is in cryptography, as well as those computer scientists, engineers and mathematicians who like to keep informed of the progress in this subject or whose work is related to it
Member of
Cataloging source
GW5XE
Image bit depth
0
LC call number
QA76.9.A25
LC item number
C79 1986
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
1986
http://bibfra.me/vocab/lite/meetingName
CRYPTO (Conference)
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • SpringerLink
  • Odlyzko, A. M
Series statement
Lecture Notes in Computer Science,
Series volume
263
http://library.link/vocab/subjectName
  • Computers
  • Cryptography
  • Ordinateurs
  • Données
  • Cryptographie
  • Coderingstheorie
  • Dataprocessing
  • Geheimschrift
  • Ordinateurs
  • Cryptographie
  • Computers
  • Cryptography
  • Informatique
Label
Advances in cryptology--CRYPTO '86 : proceedings, A.M. Odlyzko (ed.), (electronic resource)
Instantiates
Publication
Note
Held at the University of California, Santa Barbara
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Color
not applicable
Contents
Data Encryption Standard -- Structure in the S-Boxes of the DES (extended abstract) -- Cycle Structure of the DES with Weak and Semi-Weak Keys -- Public-Key Cryptography -- Private-Key Algebraic-Coded Cryptosystems -- Some Variations on RSA Signatures & their Security -- Breaking the Cade Cipher -- A Modification of a Broken Public-Key Cipher -- A Pseudo-Random Bit Generator Based on Elliptic Logarithms -- Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme -- Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?) -- A Secure and Privacy-Protecting Protocol for Transmitting Personal Information Between Organizations -- Cryptographic Protocols And Zero-Knowledge Proofs -- How to Prove All NP Statements in Zero-Knowledge and a Methodology of Cryptographic Protocol Design (Extended Abstract) -- How To Prove Yourself: Practical Solutions to Identification and Signature Problems -- Demonstrating that a Public Predicate can be Satisfied Without Revealing Any Information About How -- Demonstrating Possession of a Discrete Logarithm Without Revealing it -- Cryptographic Capsules: A Disjunctive Primitive for Interactive Protocols -- Zero-Knowledge Simulation of Boolean Circuits -- All-or-Nothing Disclosure of Secrets -- A zero-knowledge Poker protocol that achieves confidentiality of the players’ strategy or How to achieve an electronic Poker face -- Secret-Sharing Methods -- Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract) -- How to Share a Secret with Cheaters -- Smallest Possible Message Expansion in Threshold Schemes -- Hardware Systems -- VLSI implementation of public-key encryption algorithms -- Architectures for exponentiation in GF(2n) -- Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor -- Software Systems -- A High Speed Manipulation Detection Code -- Electronic Funds Transfer Point of Sale in Australia -- Software Protection, Probabilistic Methods, and Other Topics -- The Notion of Security for Probabilistic Cryptosystems (Extended Abstract) -- Large-Scale Randomization Techniques -- On the Linear Span of Binary Sequences Obtained from Finite Geometries -- Some Constructions and Bounds for Authentication Codes -- Towards a Theory of Software Protection (Extended Abstract) -- Informal Contributions -- Two Observations on Probabilistic Primality Testing -- Public Key Registration -- Is there an ultimate use of cryptography? (Extended Abstract) -- Smart Card a Highly Reliable and Portable Security Device -- Thomas — A Complete Single Chip RSA Device
Dimensions
unknown
Extent
1 online resource (xi, 487 p.)
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783540477211
Level of compression
uncompressed
Other physical details
ill.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
Stock number
978-3-540-18047-0
System control number
  • (OCoLC)262691770
  • (OCoLC)ocn262691770
Label
Advances in cryptology--CRYPTO '86 : proceedings, A.M. Odlyzko (ed.), (electronic resource)
Publication
Note
Held at the University of California, Santa Barbara
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Color
not applicable
Contents
Data Encryption Standard -- Structure in the S-Boxes of the DES (extended abstract) -- Cycle Structure of the DES with Weak and Semi-Weak Keys -- Public-Key Cryptography -- Private-Key Algebraic-Coded Cryptosystems -- Some Variations on RSA Signatures & their Security -- Breaking the Cade Cipher -- A Modification of a Broken Public-Key Cipher -- A Pseudo-Random Bit Generator Based on Elliptic Logarithms -- Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme -- Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?) -- A Secure and Privacy-Protecting Protocol for Transmitting Personal Information Between Organizations -- Cryptographic Protocols And Zero-Knowledge Proofs -- How to Prove All NP Statements in Zero-Knowledge and a Methodology of Cryptographic Protocol Design (Extended Abstract) -- How To Prove Yourself: Practical Solutions to Identification and Signature Problems -- Demonstrating that a Public Predicate can be Satisfied Without Revealing Any Information About How -- Demonstrating Possession of a Discrete Logarithm Without Revealing it -- Cryptographic Capsules: A Disjunctive Primitive for Interactive Protocols -- Zero-Knowledge Simulation of Boolean Circuits -- All-or-Nothing Disclosure of Secrets -- A zero-knowledge Poker protocol that achieves confidentiality of the players’ strategy or How to achieve an electronic Poker face -- Secret-Sharing Methods -- Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract) -- How to Share a Secret with Cheaters -- Smallest Possible Message Expansion in Threshold Schemes -- Hardware Systems -- VLSI implementation of public-key encryption algorithms -- Architectures for exponentiation in GF(2n) -- Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor -- Software Systems -- A High Speed Manipulation Detection Code -- Electronic Funds Transfer Point of Sale in Australia -- Software Protection, Probabilistic Methods, and Other Topics -- The Notion of Security for Probabilistic Cryptosystems (Extended Abstract) -- Large-Scale Randomization Techniques -- On the Linear Span of Binary Sequences Obtained from Finite Geometries -- Some Constructions and Bounds for Authentication Codes -- Towards a Theory of Software Protection (Extended Abstract) -- Informal Contributions -- Two Observations on Probabilistic Primality Testing -- Public Key Registration -- Is there an ultimate use of cryptography? (Extended Abstract) -- Smart Card a Highly Reliable and Portable Security Device -- Thomas — A Complete Single Chip RSA Device
Dimensions
unknown
Extent
1 online resource (xi, 487 p.)
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783540477211
Level of compression
uncompressed
Other physical details
ill.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
Stock number
978-3-540-18047-0
System control number
  • (OCoLC)262691770
  • (OCoLC)ocn262691770

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...