Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings
De som köpt den här boken har ofta också köpt Co-Intelligence av Ethan Mollick (häftad).
Köp båda 2 för 950 krAn international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be that many sense the im...
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to th...
Sequences And Linear Complexity.- In Memoriam Tore Herlestam (19291986).- Alternating Step Generators Controlled by De Bruijn Sequences.- Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution.- Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators.- Sequences with Almost Perfect Linear Complexity Profile.- When Shift Registers Clock Themselves.- Finite State Machine Modelling of Cryptographic Systems in Loops.- Hardware Topics.- Random Sources for Cryptographic Systems.- Physical Protection of Cryptographic Devices.- The RSA Cryptography Processor.- Public Key Topics.- Extension of BrickellS Algorithm for Breaking High Density Knapsacks.- On Privacy Homomorphisms (Extended Abstract).- An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations.- A Public Key Analog Gyptosystem.- Authentication and Secure Transactions.- Message Authentication with Arbitration of Transmitter/Receiver Disputes.- Perfect and Essentially Perfect Authentication Schemes.- Message Authentication and Dynamic Passwords.- IC-Cards in High-Security Applications.- Hash Functions and Signatures.- Collision Free Hash Functions and Public Key Signature Schemes.- Hash-Functions Using Modulo-N Operations.- Blinding for Unanticipated Signatures.- Symmetric Ciphers: Theory.- Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers.- Linear Structures in Blockciphers.- Fast Data Encipherment Algorithm FEAL.- Symmetric Ciphers: Application.- Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping.- Security Considerations in the Design and Implementation of a new DES chip.- High-Performance Interface Architectures for Cryptographic Hardware.