Advances in Cryptology – EUROCRYPT '87
Springer Berlin (Verlag)
978-3-540-19102-5 (ISBN)
Sequences And Linear Complexity.- In Memoriam Tore Herlestam (1929-1986).- Alternating Step Generators Controlled by De Bruijn Sequences.- Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution.- Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators.- Sequences with Almost Perfect Linear Complexity Profile.- When Shift Registers Clock Themselves.- Finite State Machine Modelling of Cryptographic Systems in Loops.- Hardware Topics.- Random Sources for Cryptographic Systems.- Physical Protection of Cryptographic Devices.- The RSA Cryptography Processor.- Public Key Topics.- Extension of Brickell'S Algorithm for Breaking High Density Knapsacks.- On Privacy Homomorphisms (Extended Abstract).- An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations.- A Public Key Analog Gyptosystem.- Authentication and Secure Transactions.- Message Authentication with Arbitration of Transmitter/Receiver Disputes.- Perfect and Essentially Perfect Authentication Schemes.- Message Authentication and Dynamic Passwords.- IC-Cards in High-Security Applications.- Hash Functions and Signatures.- Collision Free Hash Functions and Public Key Signature Schemes.- Hash-Functions Using Modulo-N Operations.- Blinding for Unanticipated Signatures.- Symmetric Ciphers: Theory.- Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers.- Linear Structures in Blockciphers.- Fast Data Encipherment Algorithm FEAL.- Symmetric Ciphers: Application.- Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping.- Security Considerations in the Design and Implementation of a new DES chip.- High-Performance Interface Architectures for Cryptographic Hardware.
Erscheint lt. Verlag | 13.4.1988 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | VII, 316 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 463 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • cryptography • Cryptology • Data Security • hash function • privacy |
ISBN-10 | 3-540-19102-X / 354019102X |
ISBN-13 | 978-3-540-19102-5 / 9783540191025 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich