Description |
1 online resource (vii, 489 pages) : illustrations |
Series |
Lecture notes in computer science ; 209 |
|
Lecture notes in computer science ; 209.
|
Contents |
General Theory, Classical Methods -- Cryptology and Complexity Theories -- On Cryptosystems Based on Polynomials and Finite Fields -- Algebraical Structures of Cryptographic Transformations -- Non Linear Non Commutative Functions for Data Integrity -- Wire-Tap Channel II -- Equivocations for Homophonic Ciphers -- Propagation Characteristics of the DES -- Linear Ciphers and Random Sequence Generators with Multiple Clocks -- The Stop-and-Go-Generator -- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers -- On the linear complexity of cascaded sequences -- Public-Key Systems -- RSA-bits are 0.5 +? secure -- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA's L.S.B) (Extended Abstract) -- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme -- A New Trapdoor Knapsack Public Key Cryptosystem -- RSA Chips (Past/Present/Future) (Extended abstract) -- Number Theoretical Papers -- The Quadratic Sieve Factoring Algorithm -- Status Report on Factoring (At the Sandia National Laboratories) -- Strong Primes are Easy to Find -- Discrete logarithms in finite fields and their cryptographic significance -- Channels, Networks, Key Distribution, Protocols -- User Functions for the Generation and Distribution of Encipherment Keys -- An Optimal Class of Symmetric Key Generation Systems -- On the Use of the Binary Multiplying Channel in a Private Communication System -- Secrecy and Privacy in a Local Area Network Environment -- The Subliminal Channel and Digital Signatures -- A Provably Secure Oblivious Transfer Protocol -- On Concurrent Identification Protocols (Extended Abstract) -- Applications -- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System -- Security of Transportable Computerized Files -- Encryption and Key Management for the ECS Statellite Service -- An Encryption and Authentification Procedure for Telesurveillance Systems -- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques -- Smart Cards -- Session on Smart Cards Tuesday April 10 -- Smart Card Applications in Security and Data Protection -- Bull CP8 Smart Card Uses in Cryptology -- Estimation of some Encryption Functions Implemented into Smart Cards -- Smart Cards and Conditional Access |
Bibliography |
Includes bibliographical references and index |
Notes |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
|
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL |
|
Print version record |
Subject |
Computer security -- Congresses
|
|
Data transmission systems -- Security measures -- Congresses
|
|
Cryptography -- Congresses
|
|
Computers -- Access control -- Congresses
|
|
Computers -- Access control
|
|
Computer security
|
|
Cryptography
|
|
Data transmission systems -- Security measures
|
|
Kryptologie
|
|
Kongress
|
|
Coderingstheorie.
|
|
Dataprocessing.
|
|
Geheimschrift.
|
Genre/Form |
Conference papers and proceedings
|
Form |
Electronic book
|
Author |
Beth, Thomas, 1949-
|
|
Cot, N. (Norbert), 1945-
|
|
Ingemarsson, I. (Ingemar), 1938-
|
ISBN |
9783540397571 |
|
3540397574 |
|