Description |
1 online resource (xii, 465 pages) : illustrations |
Series |
Lecture notes in computer science ; 963 |
|
Lecture notes in computer science ; 963.
|
Contents |
MDx-MAC and Building Fast MACs from Hash Functions / Bart Preneel and Paul C. van Oorschot -- XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions / Mihir Bellare, Roch Guerin and Phillip Rogaway -- Bucket Hashing and its Application to Fast Message Authentication / Phillip Rogaway -- Fast Key Exchange with Elliptic Curve Systems / Richard Schroeppel, Hilarie Orman, Sean O'Malley and Oliver Spatscheck -- Fast Server-Aided RSA Signatures Secure Against Active Attacks / Philippe Beguin and Jean-Jacques Quisquater -- Security and Performance of Server-Aided RSA Computation Protocols / Chae Hoon Lim and Pil Joong Lee -- Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver / Shai Halevi -- Precomputing Oblivious Transfer / Donald Beaver -- Committed Oblivious Transfer and Private Multi-Party Computation / Claude Crepeau, Jeroen van de Graaf and Alain Tapp |
Summary |
This book presents the proceedings of the 15th Annual International Cryptology Conference, CRYPTO '95, held in Santa Barbara, California in August 1995. This proceedings contain revised full versions of 36 papers selected during a highly competitive refereeing process from a total of 151 submissions. All current topics in cryptology research and advanced applications are addressed; The papers are organized in sections on MAC and hash, number theory, oblivious transfer, cryptanalysis, key escrow, protocols, zero knowledge and interactive protocols, secret sharing, and everything else |
Bibliography |
Includes bibliographical references and author index |
Notes |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
|
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL |
|
Print version record |
Subject |
Computers -- Access control -- Congresses
|
|
Cryptography -- Congresses
|
|
Computers -- Access control -- Congresses
|
|
Cryptography -- Congresses
|
|
Computers -- Access control
|
|
Cryptography
|
|
Kongress
|
|
Kryptologie
|
|
Geheimschrift.
|
|
Coderingstheorie.
|
|
Dataprocessing.
|
|
Cryptographie -- Congrès.
|
|
Ordinateurs -- Accès -- Contrôle -- Congrès.
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
|
Perugia (1994)
|
|
Santa Barbara (Calif., 1995)
|
Form |
Electronic book
|
Author |
Coppersmith, Don.
|
|
International Association for Cryptologic Research.
|
|
IEEE Computer Society. Technical Committee on Security and Privacy.
|
ISBN |
9783540447504 |
|
3540447504 |
|