## Advances in Cryptology--CRYPTO '87: ProceedingsAnnotation This book is the proceedings of CRYPTO '87, one in a series of annual conferences devoted to cryptologic research. CRYPTO '87 was attended by 170 people representing 19 countries. The papers in this volume are presented in seven sections. The first six sections comprise all of the papers on the regular program, including two papers that were not presented at the meeting. The seventh section contains some of the papers presented at a "Rump Session". The main sections deal with the following topics: communication networks and standards; protocols; key distribution systems; public key systems; design and analysis of cryptographic systems; and applications. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

Standards for data security a change of direction | 3 |

Integrating cryptography in ISDN | 9 |

Special uses and abuses of the FiatShamir passport protocol | 21 |

Copyright | |

31 other sections not shown

### Other editions - View all

### Common terms and phrases

algorithm Alice assume assumption authentication bit commitment Blum integer chooses chosen cipher ciphertext circuit cleartext commitment scheme communication Computer Science construction Crypto cryptographic protocol cryptosystem decryption defined denote digital signature encoding rule encryption example exists Fiat-Shamir protocol given Goldreich Goppa code grid graph Hamiltonian circuits identity identity-based IEEE implemented input integer interaction Intruder_Info Jacobi symbol key distribution systems machine matrix maximum privacy Micali minimum-knowledge modulo oblivious transfer one-way function operation output participants parties password permutation plaintext polynomial possible prime probabilistic probabilistic encryption probability distribution problem Proc proof prove pseudo-random public key quadratic residue quorum random number randomly receiver reg2 Residuosity result satisfies secrecy secret key sends session key Shamir signature simulation solution specification step string subliminal channel techniques Theorem threshold schemes transform transmitter verifier zero-knowledge