## Advances in Cryptology - AUSCRYPT '90: International Conference on Cryptology Sydney, Australia, January 8-11, 1990This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

The implementation of elliptic curve cryptosystems | 2 |

Direct demonstration of the power to break publickey cryptosystems | 14 |

Continued fractions and BerlekampMassey algorithm | 24 |

Copyright | |

31 other sections not shown

### Other editions - View all

### Common terms and phrases

access control algorithm Alice authentication system basic binary bits block cipher certificate checks ciphertext component sequences connection corresponding credential cryptographic cryptosystem database decryption defined denote digital signature discrete logarithm elements elliptic curve encryption example expert system exponent sequences factors Fibonacci Pseudoprimes formal function guarantor hash Hence host identifier IEEE implemented initialisation input integer key management schemes key schedule Lemma LFSR linear complexity Madryga matrix meet-in-the-middle attack Minos mod q module multiplication network component network security network security policy normal basis operation orthogonal output pair parity-checks permutations PIN pad plaintext polynomial prime probability problem proof pseudonym public key range equation recurrence reducible S-box satisfies secret key security class security policy sends Server shift register SKI protocol Smart Card Step stream cipher Table Theorem token universal logic sequence validator vector verify zero-knowledge