Cryptography: Policy and Algorithms: International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings
This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.
Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Personal Freedom and Law Enforcement Is it Possible to Get Agreement?
Privacy and Security Policy Choices in an NII Environment
An Australian Perspective
Information Infrastructure An Australian Perspective
Crypto in Europe Markets Law and Policy
Saving Dollars Makes Sense of Crypto Export Controls
A Proposed Architecture for Trusted Third Party Services
A New Key Escrow Cryptosystem
Discrete Optimisation and Fast Correlation Attacks
Keyed Hash Functions
Some Active Attacks on Fast ServerAided Secret Computation Protocols for Modular Exponentiation
Cryptanalysis of the Enhanced ElGamals Signature Scheme
Access with Pseudonyms
A New Identification Algorithm
Publickey Cryptography on Smart Cards
Integrating Smart Cards Into Authentication Systems
How to Fairly Reconstruct a Shared Secret
A Note on Nonuniform Decimation of Periodic Sequences
Randomness Measures Related to Subset Occurrence
Low Order Approximation of Cipher Functions
Multiple Encryption with Minimum Key
A OneKey Cryptosystem Based on a Finite Nonlinear Automaton
A Cryptanalysis of ClockControlled Shift Registers with Multiple Steps
algorithm application Australia authentication basic binary block cipher CASS shell ciphertext client Clipper chip commands Computer Science correlation attack credential cryptanalysis crypto cryptographic Cryptology cryptosystem decryption digital signatures electronic enterprise exponentiation export files Hamming sphere hardware implementation incoming communications group input integrity interface Internet issue Kerberos key escrow key management keyed hash functions keystream law enforcement length linear Mealy machine modular exponentiation module Notes in Computer obtained operating organisations output paper parity-checks password plaintext polynomial private key probability problem proposed protect protocol pseudonyms public key random reconstruction resetting result secret key secret sharing server session key shift register signature scheme smart card Step stream cipher string subsets telecommunications transactions triple encryption valid vector verifier Videocrypt wiretaps