Advances in Cryptology-AUSCRYPT ...Springer-Verlag, 1992 - Computer security |
Contents
Y Desmedt University of WisconsinMilwaukee USA | 15 |
AUTHENTICATION AND SECRET SHARING II | 33 |
R SafaviNaini L Tombak University of Wollongong Australia | 48 |
Copyright | |
12 other sections not shown
Other editions - View all
Common terms and phrases
Advances in Cryptology algorithm attack authentication bent functions binary bits block cipher boolean functions ciphertext code noising collision Computer Science construction cryptanalysis Crypto Cryptology cryptosystem defined definition denote Desmedt Differential cryptanalysis digital signature discrete logarithm EC version elliptic curve encryption Eurocrypt function f geometric sequence GF(q given hash functions IEEE input integer intruder keystream Lecture Notes Lemma length LOKI LOKI 91 method modular modulo multiplications nonlinearity Notes in Computer obtain one-way function optimal output P₁ pair paper parameter permutation plaintext polynomial prime factors probability problem Proc Proof properties proposed pseudorandom random number result round S-boxes secret key secret sharing secret sharing scheme secure addition sequence security level sends Server shift register signatory signature scheme Springer-Verlag step stream cipher subliminal channel Theorem undeniable signature variables vector verifier voter zero zero-knowledge