S C Serpell, C B Brookson, B L Clark (auth.), George Robert Blakley, David Chaum (eds.)3540156585, 9783540156581
Table of contents :
A Prototype Encryption System Using Public Key….Pages 3-9
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms….Pages 10-18
A Public-Key Cryptosystem Based on the Word Problem….Pages 19-36
Efficient Signature Schemes Based on Polynomial Equations (preliminary version)….Pages 37-46
Identity-Based Cryptosystems and Signature Schemes….Pages 47-53
A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields (preliminary draft)….Pages 54-65
Some Public-Key Crypto-Functions as Intractable as Factorization….Pages 66-70
Computing Logarithms in GF (2 n )….Pages 73-82
Wyner’s Analog Encryption Scheme: Results of a Simulation….Pages 83-94
On Rotation Group and Encryption of Analog Signals….Pages 95-100
The History of Book Ciphers….Pages 101-113
An Update on Factorization at Sandia National Laboratories….Pages 114-114
An LSI Digital Encryption Processor (DEP)….Pages 115-143
Efficient hardware and software implementations for the DES….Pages 144-146
Efficient hardware implementation of the DES….Pages 147-173
A Self-Synchronizing Cascaded Cipher System with Dynamic Control of Error Propagation….Pages 174-190
Efficient and Secure Pseudo-Random Number Generation (Extended Abstract)….Pages 193-202
An LSI Random Number Generator (RNG)….Pages 203-230
Generalized Linear Threshold Scheme….Pages 231-241
Security of Ramp Schemes….Pages 242-268
A Fast Pseudo Random Permutation Generator With Applications to Cryptology….Pages 269-275
On the Cryptographic Applications of Random Functions (Extended Abstract)….Pages 276-288
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information….Pages 289-299
Information Theory without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects….Pages 303-313
Cryptanalysis of Adfgvx Encipherment Systems….Pages 314-338
Breaking Iterated Knapsacks….Pages 339-341
Dependence of output on input in DES: Small avalanche characteristics….Pages 342-358
Des has no Per Round Linear Factors….Pages 359-376
A Message Authenticator Algorithm Suitable for a Mainframe Computer….Pages 377-389
Key Management for Secure Electronic Funds Transfer in a Retail Environment….Pages 393-400
Authentication Theory/Coding Theory….Pages 401-410
New Secret Codes Can Prevent a Computerized Big Brother….Pages 411-431
Fair Exchange of Secrets (extended abstract)….Pages 432-433
Cryptoprotocols: Subscription to a Public Key, The Secret Blocking and The Multi-Player Mental Poker Game (extended abstract)….Pages 434-438
Poker Protocols….Pages 439-453
A “Paradoxical” Solution to The Signature Problem….Pages 454-464
Sequence Complexity as a Test for Cryptographic Systems….Pages 467-467
An Update on Quantum Cryptography….Pages 468-474
How to Keep a Secret Alive….Pages 475-480
….Pages 481-485
Reviews
There are no reviews yet.