## Advances in Cryptology - AUSCRYPT '90: International Conference on Cryptology Sydney, Australia, January 8-11, 1990This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

The implementation of elliptic curve cryptosystems | 2 |

Direct demonstration of the power to break publickey cryptosystems | 14 |

Continued fractions and BerlekampMassey algorithm | 24 |

Copyright | |

32 other sections not shown

### Other editions - View all

### Common terms and phrases

access control algorithm Alice authentication system avalanche effect basic binary bits block cipher certificate checks ciphertext component sequences Computer Science corresponding credential cryptographic cryptosystem database decryption defined denote digital signature discrete logarithm elements elliptic curve encryption exponent sequences factors Fibonacci Pseudoprimes formal function hash Hence host identifier IEEE implementation initialisation input integer key management schemes key schedule Lemma LFSR linear complexity Madryga matrix meet-in-the-middle attack Minos mod 9 mod q module multiplication network component network security network security policy normal basis operation orthogonal output parity-checks permutations PIN pad plaintext polynomial prime problem Proc proof pseudonym public key range equation recurrence reducible S-box satisfies secret key security class security policy sends Server shift register Smart Card statistical Step Stream Ciphers Table Theorem universal logic sequence validator vector verify zero-knowledge