## Advances in Cryptology - CRYPTO '86: ProceedingsThis volume contains the proceedings of CRYPTO 86, one in a series of annual conferences at the University of California at Santa Barbara devoted to cryptologic research. The papers are presented in seven sections containing most of the presentations in the regular program, and a final section based on some informal presentations at a "Rump Session". The volume presents a very comprehensive picture of the latest public research in cryptography. Together with the proceedings of the previous Crypto and Eurocrypt meetings, it forms a set of indispensable reference works in this area. Of particular interest in this volume is the extensive section on zero-knoewledge proofs, which are a significant new development. This volume is intended for all those whose main interest is in cryptography, as well as those computer scientists, engineers and mathematicians who like to keep informed of the progress in this subject or whose work is related to it. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

Structure in the Sboxes of the DES Extended abstract | 3 |

Cycle structure of the DES with weak | 9 |

Privatekey algebraiccoded cryptosystems | 35 |

Copyright | |

26 other sections not shown

### Other editions - View all

### Common terms and phrases

adder Alice assume attack authentication bits Boolean Boolean circuit bytes capsule cheating checksum chip chooses chosen cipher circuit Computer Science convince Bob coprime corresponding CRYPTO cryptographic cryptographic protocol cryptosystem decryption defined definition denote device digits eftpos elements elliptic curves equations execution factors formal credential mechanism function given Goldreich Goldwasser IEEE implementation individuals input integer interactive proof interactive proof system Lemma linear span message space Micali modulo obtained one-way function operations output pair participants permutation plaintext polynomial polynomial-time possible prime probabilistic encryption probability distribution problem Proc protocol prove pseudo-random pseudonyms public key quadratic residue random randomly result S-boxes satisfy secret key semantic security sends sequence Shamir signature scheme solution step string subset terminal initializer Theorem tion trapdoor tuples valid vector verifier zero-knowledge zero-knowledge proof