Advances in Cryptology - AUSCRYPT '90: International Conference on Cryptology Sydney, Australia, January 8-11, 1990
Jennifer Seberry, Josef Pieprzyk
Springer, Sep 21, 1990 - Computers - 462 pages
This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology.
What people are saying - Write a review
We haven't found any reviews in the usual places.
The implementation of elliptic curve cryptosystems
Direct demonstration of the power to break publickey cryptosystems
Continued fractions and BerlekampMassey algorithm
31 other sections not shown
Other editions - View all
access control algorithm Alice authentication system basic binary bits block cipher certificate checks ciphertext component sequences connection corresponding credential cryptographic cryptosystem database decryption defined denote digital signature discrete logarithm elements elliptic curve encryption example expert system exponent sequences factors Fibonacci Pseudoprimes formal function guarantor hash Hence host identifier IEEE implemented initialisation input integer key management schemes key schedule Lemma LFSR linear complexity Madryga matrix meet-in-the-middle attack Minos mod q module multiplication network component network security network security policy normal basis operation orthogonal output pair parity-checks permutations PIN pad plaintext polynomial prime probability problem proof pseudonym public key range equation recurrence reducible S-box satisfies secret key security class security policy sends Server shift register SKI protocol Smart Card Step stream cipher Table Theorem token universal logic sequence validator vector verify zero-knowledge