Advances in cryptology--EUROCRYPT '97: International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997 : proceedings
Springer, 1997 - Technology & Engineering - 507 pages
This book constitutes the refereed proceedings of the 15th Annual EUROCRYPT'97 conference on the Theory and Application of Cryptographic Techniques, held in Konstanz, Germany, in May 1997, under the sponsorship of the International Association for Cryptologic Research.
The 34 revised full papers included were carefully selected from a total of 104 high-quality submissions. The book addresses all current issues of the booming area of research and development in cryptology; it also advances the state of the art in application areas like security and privacy, digital communication, and electronic commerce.
22 pages matching keystream in this book
Results 1-3 of 22
What people are saying - Write a review
We haven't found any reviews in the usual places.
Combinatorial Properties of Basic Encryption Operations
Public Key Systems
27 other sections not shown
Other editions - View all
Advances in Cryptology — EUROCRYPT ’97: International Conference on the ...
Limited preview - 2003
Advances in Cryptology adversary algorithm Alice and Bob apply assume assumption attack authentication binary bits block boolean function buyer channel ciphertext collision-free Computer Science construction correlation coefficient Crypto cryptographic cryptosystem decryption defined denote Diffie-Hellman discrete logarithm problem efficient ElGamal ElGamal encryption encryption EUROCRYPT factor fingerprinting finite fields GCHQ given hash family hash functions identification scheme IEEE implementation incremental input integer invertible keystream lattice Lecture Notes Lemma length LFSR linear lower bound mod q modulo MuHASH multiplication Notes in Computer Oblivious Transfer obtain one-way function operation oracle output permutation plaintext polynomial prime privacy amplification proof of knowledge protocol prover public key random variable registration center Renyi entropy result satisfying assignment secret key Section sends session key setup signature scheme smooth entropy Springer-Verlag string technique Theorem uniformly universal hash vector verifier zero-knowledge