Advances in Cryptology 1981 – 1997: Electronic Proceedings by Allen Gersho (auth.), Kevin S. McCurley, Claus Dieter

By Allen Gersho (auth.), Kevin S. McCurley, Claus Dieter Ziegler (eds.)

AboutCryptology it's nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will eventually be as pervasive and profound as was once introduced through the commercial revolution of the final century. From the start of time, info has been a huge asset for people. within the early days of humanexistence,themereknowledgeofwheretomosteasilygatherfoodwas the di?erence among lifestyles and dying. all through background, details has supplied the skill for profitable wars, making fortunes, and shaping background. The underlying topic of the knowledge revolution is that we proceed to ?nd new how one can use details. those new makes use of for info serve to focus on our have to guard di?erent points of data. Cryptology should be greatly de?ned because the scienti?c examine of hostile details defense. Cryptology has commonly handled the co- dentiality of knowledge, yet innovation in utilizing details produces new specifications for cover of that details. a few are longstanding and basic - how will we ensure that info is ”authentic”? How can we be sure that info is well timed? How do we produce bits that experience an analogous homes as ”money”? every one of those questions has been grappled with within the cryptologic study community.

Show description

Read or Download Advances in Cryptology 1981 – 1997: Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conferences 1981 – 1997 PDF

Best nonfiction_8 books

Signal Processing and Pattern Recognition in Nondestructive Evaluation of Materials

The NATO complicated examine Workshop on sign Processing and development reputation in Nondestructive overview (NOE) of fabrics used to be held August 19-22, 1987 on the Manoir St-Castin, Lac Beauport, Quebec, Canada. sleek sign processing, trend popularity and synthetic intelligence were taking part in an more and more vital position in enhancing nondestructive overview and trying out concepts.

Incommensurate Crystals, Liquid Crystals, and Quasi-Crystals

During this NATO-sponsored complicated study Workshop we succeeded in bringing jointly nearly 40 scientists operating within the 3 major parts of structurally incommensurate fabrics: incommensurate crystals (primarily ferroelectric insulators), incommensurate liquid crystals, and steel quasi-crystals.

Additional resources for Advances in Cryptology 1981 – 1997: Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conferences 1981 – 1997

Sample text

And Noebauer, R. Simultaneous security of bits in the discrete log . . . . . . . . . . . . 62 Peralta, R. On public-key cryptosystems built using polynomial rings . . . . . . . 73 Pieprzyk, Y. Is the data encryption standard a group? . . . . . . . . . . . . . . . 81 Kaliski, B. , Rivest, R. L. and Sherman, A. T. Two new secret key cryptosystems . . . . . . . . . . . . . . . . . . . 96 Meijer, H. and Akl, S. G. Cryptanalysts representation of nonlinearly filtered ML-sequences .

111 Godlewski, P. and Cohen, G. D. On functions of linear shift register sequences . . . . . . . . . . . . . 119 Herlestam, T. On feedforward transforms and p-fold periodic p-arrays . . . . . . . . 130 Chen, D. and Dai, Z. Generalized multiplexed sequences . . . . . . . . . . . . . . . . . . Liu, M. and Wan, Z. 135 EUROCRYPT '85 47 A note on sequences generated by clock controlled shift registers . . . 142 Smeets, B. Using algorithms as keys in stream ciphers .

411 Simmons, G. J. New secret codes can prevent a computerized big brother . . . . . . . 432 Chaum, D. Fair exchange of secrets . . . . . . . . . . . . . . . . . . . . . . . . 434 Tedrick, T. Cryptoprotocols: Subscription to a public key, the secret blocking and the multi-player mental poker game . . . . . . . . . . . . . . . . . . . . 439 Yung, M. Poker protocols . . . . . . . . . . . . . . . . . . . .

Download PDF sample

Rated 4.75 of 5 – based on 18 votes