James L. Massey (auth.), David Chaum, Wyn L. Price (eds.)354019102X, 9783540191025
Table of contents :
In Memoriam Tore Herlestam (1929–1986)….Pages 3-4
Alternating Step Generators Controlled by De Bruijn Sequences….Pages 5-14
Generation of Binary Sequences with Controllable Complexity and Ideal r -Tupel Distribution….Pages 15-23
Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators….Pages 25-35
Sequences with Almost Perfect Linear Complexity Profile….Pages 37-51
When Shift Registers Clock Themselves….Pages 53-64
Finite State Machine Modelling of Cryptographic Systems in Loops….Pages 65-73
Random Sources for Cryptographic Systems….Pages 77-81
Physical Protection of Cryptographic Devices….Pages 83-93
The RSA Cryptography Processor….Pages 95-105
Extension of Brickell’S Algorithm for Breaking High Density Knapsacks….Pages 109-115
On Privacy Homomorphisms (Extended Abstract)….Pages 117-125
An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations….Pages 127-141
A Public Key Analog Gyptosystem….Pages 143-147
Message Authentication with Arbitration of Transmitter/Receiver Disputes….Pages 151-165
Perfect and Essentially Perfect Authentication Schemes….Pages 167-170
Message Authentication and Dynamic Passwords….Pages 171-175
IC-Cards in High-Security Applications….Pages 177-199
Collision Free Hash Functions and Public Key Signature Schemes….Pages 203-216
Hash-Functions Using Modulo-N Operations….Pages 217-226
Blinding for Unanticipated Signatures….Pages 227-233
Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers….Pages 237-247
Linear Structures in Blockciphers….Pages 249-266
Fast Data Encipherment Algorithm FEAL….Pages 267-278
Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping….Pages 281-286
Security Considerations in the Design and Implementation of a new DES chip….Pages 287-300
High-Performance Interface Architectures for Cryptographic Hardware….Pages 301-309
Reviews
There are no reviews yet.