Advances in Cryptology - AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings
Jennifer Seberry, Yuliang Zheng
Springer, Nov 5, 1993 - Computers - 543 pages
This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Y Desmedt University of WisconsinMilwaukee USA
AUTHENTICATION AND SECRET SHARING II
R SafaviNaini L Tombak University of Wollongong Australia
12 other sections not shown
Other editions - View all
Advances in Cryptology algorithm attack authentication binary bits block cipher boolean functions ciphertext code noising collision common secret Computer Science construction cryptanalysis Crypto cryptosystem defined definition denote Desmedt Differential cryptanalysis Diffie-Hellman digital signature discrete logarithm EC version elliptic curve encryption exponentiation geometric sequence GF(q given Hamming weight hash functions IEEE input integer intruder keystream Lecture Notes Lemma length LOKI matrix method modular modulo multiplications nonlinear Notes in Computer O.SO obtain one-way function output pair paper parameter permutation Petri nets plaintext polynomial prime factors probability problem Proc Proof properties proposed pseudorandom random number result round S-boxes secret key secret sharing secret sharing scheme secure addition sequence security level Server shift register signatory signature scheme smart card Springer-Verlag step stream cipher subliminal channel Theorem undeniable signature variables vector verifier voter zero zero-knowledge