Alfred Menezes, Scott Vanstone (auth.), Jennifer Seberry, Josef Pieprzyk (eds.)3540530002, 9783540530008, 0387530002
Table of contents :
The implementation of elliptic curve cryptosystems….Pages 1-13
Direct demonstration of the power to break public-key cryptosystems….Pages 14-21
Continued fractions and the Berlekamp-Massey algorithm….Pages 23-31
Nonlinear generators of binary sequences with controllable complexity and double key….Pages 32-36
K-M sequence is forwardly predictable….Pages 37-38
Lower bounds on the weight complexities of cascaded binary sequences….Pages 39-43
Secure user access control for public networks….Pages 45-57
Formal specification and verification of secure communication protocols….Pages 58-73
Network security policy models….Pages 74-95
KEYMEX: An expert system for the design of key management schemes….Pages 96-103
On the formal analysis of PKCS authentication protocols….Pages 105-121
Some remarks on authentication systems….Pages 122-139
Meet-in-the-middle attack on digital signature schemes….Pages 140-154
A binary sequence generator based on Ziv-Lempel source coding….Pages 155-164
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence….Pages 165-175
Parallel generation of pseudo-random sequences….Pages 176-193
Large primes in stream cipher cryptography….Pages 194-205
Comparison of block ciphers….Pages 207-220
Key scheduling in des type cryptosystems….Pages 221-228
LOKI — A cryptographic primitive for authentication and secrecy applications….Pages 229-236
Permutation generators of alternating groups….Pages 237-244
Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms….Pages 245-264
A (non-practical) three-pass identification protocol using coding theory….Pages 265-272
Demonstrating possession without revealing factors and its application….Pages 273-293
Anonymous one-time signatures and flexible untraceable electronic cash….Pages 294-305
Dyadic matrices and their potential significance in cryptography (abstract)….Pages 307-310
A note on strong Fibonacci pseudoprimes….Pages 311-317
On the significance of the directed acyclic word graph in cryptology….Pages 318-326
Solving equations in sequences….Pages 327-332
The practical application of state of the art security in real environments….Pages 333-355
RSA as a benchmark for multiprocessor machines….Pages 356-359
Range equations and range matrices: a study in statistical database security….Pages 360-385
Record encryption in distributed databases….Pages 386-395
VLSI design for exponentiation in GF (2 n )….Pages 397-405
A fast modular-multiplication module for smart cards….Pages 406-409
Minòs: Extended user authentication….Pages 410-423
Universal logic sequences….Pages 425-432
The three faces of information security….Pages 433-450
Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system….Pages 451-462
Reviews
There are no reviews yet.