Advances in Cryptology - CRYPTO '89: Proceedings
Springer, Jun 18, 1990 - Computers - 634 pages
CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. This volume presents the proceedings of the ninth CRYPTO meeting. The papers are organized into sections with the following themes: Why is cryptography harder than it looks?, pseudo-randomness and sequences, cryptanalysis and implementation, signature and authentication, threshold schemes and key management, key distribution and network security, fast computation, odds and ends, zero-knowledge and oblivious transfer, multiparty computation.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Keying the German navys Enigma invited
On the existence of bit commitment schemes and zeroknowledge proofs
Problems with the normal use of cryptography for providing security
13 other sections not shown
Other editions - View all
addition chain Advances in Cryptology algorithm Alice applications assume assumption authentication path binary bit commitment blobs block cipher checksum ciphertext circuit collision commitment scheme complexity Computer Science construct CRYPTO cryptographic Cryptology cryptosystem decryption defined definition denote digital signature discrete logarithm efficient elements encryption scheme exists exponentiation finite gates given Goldreich IEEE implementation input integer interactive proof knowledge proofs Lemma length linear logarithmic signature machine master key matrix method Micali modulo non-interactive oblivious transfer one-way function one-way hash function output pair paper password permutation plaintext polynomial polynomial-time probabilistic probability problem Proc proof of knowledge proof system protocol prove pseudorandom public key quadratic randomly reduced result reveal s-boxes satisfies secret key secret sharing scheme sends sequence Shamir signature scheme simulator string subset tape Theorem threshold scheme transformations UNIX vector verifier zero zero-knowledge proofs