Limit search to available items
Book Cover
E-book
Author EUROCRYPT (Conference) (1984 : University of Paris, Sorbonne)

Title Advances in cryptology : proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984 / edited by T. Beth, N. Cot, and I. Ingemarsson
Published Berlin ; New York : Springer-Verlag, ©1985

Copies

Description 1 online resource (vii, 489 pages) : illustrations
Series Lecture notes in computer science ; 209
Lecture notes in computer science ; 209.
Contents General Theory, Classical Methods -- Cryptology and Complexity Theories -- On Cryptosystems Based on Polynomials and Finite Fields -- Algebraical Structures of Cryptographic Transformations -- Non Linear Non Commutative Functions for Data Integrity -- Wire-Tap Channel II -- Equivocations for Homophonic Ciphers -- Propagation Characteristics of the DES -- Linear Ciphers and Random Sequence Generators with Multiple Clocks -- The Stop-and-Go-Generator -- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers -- On the linear complexity of cascaded sequences -- Public-Key Systems -- RSA-bits are 0.5 +? secure -- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA's L.S.B) (Extended Abstract) -- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme -- A New Trapdoor Knapsack Public Key Cryptosystem -- RSA Chips (Past/Present/Future) (Extended abstract) -- Number Theoretical Papers -- The Quadratic Sieve Factoring Algorithm -- Status Report on Factoring (At the Sandia National Laboratories) -- Strong Primes are Easy to Find -- Discrete logarithms in finite fields and their cryptographic significance -- Channels, Networks, Key Distribution, Protocols -- User Functions for the Generation and Distribution of Encipherment Keys -- An Optimal Class of Symmetric Key Generation Systems -- On the Use of the Binary Multiplying Channel in a Private Communication System -- Secrecy and Privacy in a Local Area Network Environment -- The Subliminal Channel and Digital Signatures -- A Provably Secure Oblivious Transfer Protocol -- On Concurrent Identification Protocols (Extended Abstract) -- Applications -- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System -- Security of Transportable Computerized Files -- Encryption and Key Management for the ECS Statellite Service -- An Encryption and Authentification Procedure for Telesurveillance Systems -- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques -- Smart Cards -- Session on Smart Cards Tuesday April 10 -- Smart Card Applications in Security and Data Protection -- Bull CP8 Smart Card Uses in Cryptology -- Estimation of some Encryption Functions Implemented into Smart Cards -- Smart Cards and Conditional Access
Bibliography Includes bibliographical references and index
Notes Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Print version record
Subject Computer security -- Congresses
Data transmission systems -- Security measures -- Congresses
Cryptography -- Congresses
Computers -- Access control -- Congresses
Computers -- Access control
Computer security
Cryptography
Data transmission systems -- Security measures
Kryptologie
Kongress
Coderingstheorie.
Dataprocessing.
Geheimschrift.
Genre/Form Conference papers and proceedings
Form Electronic book
Author Beth, Thomas, 1949-
Cot, N. (Norbert), 1945-
Ingemarsson, I. (Ingemar), 1938-
ISBN 9783540397571
3540397574