Advances in Cryptology - AUSCRYPT '90: International Conference on Cryptology Sydney, Australia, January 8-11, 1990
Jennifer Seberry, Josef Pieprzyk
Springer, Sep 21, 1990 - Computers - 462 pages
This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology.
What people are saying - Write a review
We haven't found any reviews in the usual places.
The implementation of elliptic curve cryptosystems
Direct demonstration of the power to break publickey cryptosystems
Continued fractions and BerlekampMassey algorithm
32 other sections not shown
Other editions - View all
access control algorithm Alice authentication system avalanche effect basic binary bits block cipher certificate checks ciphertext component sequences Computer Science corresponding credential cryptographic cryptosystem database decryption defined denote digital signature discrete logarithm elements elliptic curve encryption exponent sequences factors Fibonacci Pseudoprimes formal function hash Hence host identifier IEEE implementation initialisation input integer key management schemes key schedule Lemma LFSR linear complexity Madryga matrix meet-in-the-middle attack Minos mod 9 mod q module multiplication network component network security network security policy normal basis operation orthogonal output parity-checks permutations PIN pad plaintext polynomial prime problem Proc proof pseudonym public key range equation recurrence reducible S-box satisfies secret key security class security policy sends Server shift register Smart Card statistical Step Stream Ciphers Table Theorem universal logic sequence validator vector verify zero-knowledge