E-Book, Englisch, Band 304, 316 Seiten, eBook
Chaum / Price Advances in Cryptology – EUROCRYPT '87
Erscheinungsjahr 2003
ISBN: 978-3-540-39118-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings
E-Book, Englisch, Band 304, 316 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-39118-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Sequences And Linear Complexity.- In Memoriam Tore Herlestam (1929–1986).- Alternating Step Generators Controlled by De Bruijn Sequences.- Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution.- Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators.- Sequences with Almost Perfect Linear Complexity Profile.- When Shift Registers Clock Themselves.- Finite State Machine Modelling of Cryptographic Systems in Loops.- Hardware Topics.- Random Sources for Cryptographic Systems.- Physical Protection of Cryptographic Devices.- The RSA Cryptography Processor.- Public Key Topics.- Extension of Brickell’S Algorithm for Breaking High Density Knapsacks.- On Privacy Homomorphisms (Extended Abstract).- An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations.- A Public Key Analog Gyptosystem.- Authentication and Secure Transactions.- Message Authentication with Arbitration of Transmitter/Receiver Disputes.- Perfect and Essentially Perfect Authentication Schemes.- Message Authentication and Dynamic Passwords.- IC-Cards in High-Security Applications.- Hash Functions and Signatures.- Collision Free Hash Functions and Public Key Signature Schemes.- Hash-Functions Using Modulo-N Operations.- Blinding for Unanticipated Signatures.- Symmetric Ciphers: Theory.- Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers.- Linear Structures in Blockciphers.- Fast Data Encipherment Algorithm FEAL.- Symmetric Ciphers: Application.- Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping.- Security Considerations in the Design and Implementation of a new DES chip.- High-Performance Interface Architectures for Cryptographic Hardware.