Cryptography: Policy and Algorithms: International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings

Front Cover
Springer Science & Business Media, Jan 24, 1996 - Computers - 325 pages
This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.
Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Personal Freedom and Law Enforcement Is it Possible to Get Agreement?
1
Privacy and Security Policy Choices in an NII Environment
20
An Australian Perspective
40
Information Infrastructure An Australian Perspective
65
Crypto in Europe Markets Law and Policy
75
Saving Dollars Makes Sense of Crypto Export Controls
90
A Proposed Architecture for Trusted Third Party Services
98
A New Key Escrow Cryptosystem
105
Discrete Optimisation and Fast Correlation Attacks
186
Keyed Hash Functions
201
Some Active Attacks on Fast ServerAided Secret Computation Protocols for Modular Exponentiation
215
Cryptanalysis of the Enhanced ElGamals Signature Scheme
228
Access with Pseudonyms
232
A New Identification Algorithm
244
Publickey Cryptography on Smart Cards
250
Integrating Smart Cards Into Authentication Systems
270

How to Fairly Reconstruct a Shared Secret
115
A Note on Nonuniform Decimation of Periodic Sequences
125
Randomness Measures Related to Subset Occurrence
132
Low Order Approximation of Cipher Functions
144
Multiple Encryption with Minimum Key
156
A OneKey Cryptosystem Based on a Finite Nonlinear Automaton
165
A Cryptanalysis of ClockControlled Shift Registers with Multiple Steps
174
SmartCard with Interferometric Quantum Cryptography Device
282
Cryptographic APIs
290
Foiling Active Network Impersonation Attacks Made In Collusion With An Insider
301
The CASS Shell
313
Author Index
Copyright

Common terms and phrases

Bibliographic information