E. F. Brickell, J. H. Moore, M. R. Purtill (auth.), Andrew M. Odlyzko (eds.)3540180478, 9783540180470
Table of contents :
Structure in the S -Boxes of the DES (extended abstract)….Pages 3-8
Cycle Structure of the DES with Weak and Semi-Weak Keys….Pages 9-32
Private-Key Algebraic-Coded Cryptosystems….Pages 35-48
Some Variations on RSA Signatures & their Security….Pages 49-59
Breaking the Cade Cipher….Pages 60-63
A Modification of a Broken Public-Key Cipher….Pages 64-83
A Pseudo-Random Bit Generator Based on Elliptic Logarithms….Pages 84-103
Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme….Pages 104-110
Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?)….Pages 111-117
A Secure and Privacy-Protecting Protocol for Transmitting Personal Information Between Organizations….Pages 118-167
How to Prove All NP Statements in Zero-Knowledge and a Methodology of Cryptographic Protocol Design (Extended Abstract)….Pages 171-185
How To Prove Yourself: Practical Solutions to Identification and Signature Problems….Pages 186-194
Demonstrating that a Public Predicate can be Satisfied Without Revealing Any Information About How….Pages 195-199
Demonstrating Possession of a Discrete Logarithm Without Revealing it….Pages 200-212
Cryptographic Capsules: A Disjunctive Primitive for Interactive Protocols….Pages 213-222
Zero-Knowledge Simulation of Boolean Circuits….Pages 223-233
All-or-Nothing Disclosure of Secrets….Pages 234-238
A zero-knowledge Poker protocol that achieves confidentiality of the players’ strategy or How to achieve an electronic Poker face….Pages 239-247
Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract)….Pages 251-260
How to Share a Secret with Cheaters….Pages 261-265
Smallest Possible Message Expansion in Threshold Schemes….Pages 266-274
VLSI implementation of public-key encryption algorithms….Pages 277-301
Architectures for exponentiation in GF(2 n )….Pages 302-310
Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor….Pages 311-323
A High Speed Manipulation Detection Code….Pages 327-346
Electronic Funds Transfer Point of Sale in Australia….Pages 347-377
The Notion of Security for Probabilistic Cryptosystems (Extended Abstract)….Pages 381-392
Large-Scale Randomization Techniques….Pages 393-404
On the Linear Span of Binary Sequences Obtained from Finite Geometries….Pages 405-417
Some Constructions and Bounds for Authentication Codes….Pages 418-425
Towards a Theory of Software Protection (Extended Abstract)….Pages 426-439
Two Observations on Probabilistic Primality Testing….Pages 443-450
Public Key Registration….Pages 451-458
Is there an ultimate use of cryptography? (Extended Abstract)….Pages 459-463
Smart Card a Highly Reliable and Portable Security Device….Pages 464-479
Thomas — A Complete Single Chip RSA Device….Pages 480-487
Reviews
There are no reviews yet.