Advances in Cryptology - CRYPTO '90: Proceedings
Alfred J. Menezes, Scott A. Vanstone
Springer, Dec 13, 1991 - Computers - 644 pages
This volume gives the proceedings of Crypto '90, held at the University of California at Santa Barbara, August 11-15, 1990. The conference attracted 227 participants from twenty countries, with attendees from academia, industry, and government. The program provided a balance between the theoretical and the practical aspects of cryptography to meet the needs and diversified interests of the various groups. The selected papers are organized into sections on cryptanalysis, protocols, algebra and number theory, signatures and authentication, secret sharing, key distribution,hash functions, zero-knowledge, randomness, applications, design and analysis, and impromptu talks.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Differential Cryptanalysis of DESlike Cryptosystems invited talk
A Statistical Attack of the Feal8 Cryptosystem
Quantum Bit Commitment and Coin Tossing Protocols
36 other sections not shown
Other editions - View all
algorithm assumption attack authentication bit commitment scheme block byte chosen chosen plaintext attack ciphertext circuit coin flips commitment scheme Computer Science concurrence scheme constant construct CRYPTO cryptographic cryptosystem define Definition denote digital signature digital signature scheme discrete logarithm elliptic curve entries equations exists exponentiation Fiat-Shamir given Goldreich Goldwasser group action identity-based IEEE implementation input bits integer interactive proof systems key distribution schemes Khufu Lemma matrix Micali modulo non-interactive non-transitive digital signature notarized envelope oblivious transfer one-way function one-way hash functions output bits pairs participants permutation plaintext players polynomial-time probabilistic polynomial probability problem Proc protocol prove pseudo-random public key random bits random number random string randomly result round S-box secret key secret sharing secure sends sequence Shamir shared secret scheme signer simulator statistical Step strong S-boxes Theorem time-stamping undeniable signature uniformly verifier zero-knowledge proof