Wyn L. Price (auth.), Carl Pomerance (eds.)9783540187967, 3540187960
Table of contents :
Standards for Data Security — a Change of Direction….Pages 3-8
Integrating Cryptography in ISDN….Pages 9-18
Special Uses and Abuses of the Fiat-Shamir Passport Protocol (extended abstract)….Pages 21-39
Direct Minimum-Knowledge Computations (Extended Abstract)….Pages 40-51
Non-Interactive Zero-Knowledge Proof Systems….Pages 52-72
How to Solve any Protocol Problem – An Efficiency Improvement (Extended Abstract)….Pages 73-86
Multiparty Computations Ensuring Privacy of Each Party’s Input and Correctness of the Result….Pages 87-119
Society and Group Oriented Cryptography: a New Concept….Pages 120-127
A Simple and Secure Way to Show the Validity of Your Public Key….Pages 128-134
Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model (Extended Abstract)….Pages 135-155
Gradual and Verifiable Release of a Secret (Extended Abstract)….Pages 156-166
Strong Practical Protocols….Pages 167-172
Identity-based conference key distribution systems….Pages 175-184
On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem….Pages 185-193
Key Distribution Systems Based on Identification Information….Pages 194-202
Secret Distribution of Keys for Public-Key Systems….Pages 203-208
An Impersonation-Proof Identity Verification Scheme….Pages 211-215
Arbitration in Tamper Proof Systems….Pages 216-222
Efficient Digital Public-Key Signatures with Shadow….Pages 223-223
Security-Related Comments Regarding McEliece’s Public-Key Cryptosystem….Pages 224-228
Components and Cycles of a Random Function….Pages 231-242
Fast Spectral Tests for Measuring Nonrandomness and the DES….Pages 243-254
Other Cycling Tests for DES….Pages 255-256
A Crypto-Engine….Pages 257-268
A Natural Taxonomy for Digital Information Authentication Schemes….Pages 269-288
Analyzing Encryption Protocols Using Formal Verification Techniques (Extended Abstract)….Pages 289-305
Cryptosystems based on an analog of heat flow….Pages 306-329
A Combinatorial Approach to Threshold Schemes….Pages 330-339
A Realization Scheme for the Identity-Based Cryptosystem….Pages 340-349
Equivalence Between Two Flavours of Oblivious Transfers….Pages 350-354
A construction for authentication / secrecy codes from certain combinatorial designs….Pages 355-366
A Digital Signature Based on a Conventional Encryption Function….Pages 369-378
How to Make Replicated Data Secure….Pages 379-391
A Study of Password Security….Pages 392-397
A Video Scrambling Technique Based On Space Filling Curves (Extended Abstract)….Pages 398-417
Secure Audio Teleconference….Pages 418-426
Attack on the Koyama-Ohta Identity Based Key Distribution Scheme….Pages 429-433
On the F-function of FEAL….Pages 434-437
Patterns of Entropy Drop of the Key in an S-Box of the DES (Extended Abtract)….Pages 438-444
The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack….Pages 445-457
On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme….Pages 458-460
A Generalization of Hellman’s Extension of Shannon’s Approach to Cryptography (Abstract)….Pages 461-461
Multiparty Unconditionally Secure Protocols (Abstract)….Pages 462-462
Reviews
There are no reviews yet.