Advances in Cryptology — AUSCRYPT '92 [electronic resource] : Workshop on the Theory and Application of Cryptographic Techniques Gold Coast, Queensland, Australia, December 13–16, 1992 Proceedings / edited by Jennifer Seberry, Yuliang Zheng.

By: Seberry, Jennifer [editor.]Contributor(s): Zheng, Yuliang [editor.] | SpringerLink (Online service)Material type: TextTextLanguage: English Series: Lecture Notes in Computer Science: 718Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1993Description: XIII, 444 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540479765Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Coding theory | Combinatorics | Computer Science | Data Encryption | Coding and Information Theory | Operating Systems | Combinatorics | Computer Communication NetworksAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Threshold cryptosystems -- Authentication codes with perfect protection -- Practical proven secure authentication with arbitration -- Authentication codes under impersonation attack -- Cumulative arrays and geometric secret sharing schemes -- Nonperfect secret sharing schemes -- A construction of practical secret sharing schemes using linear block codes -- HAVAL — A one-way hashing algorithm with variable length of output (extended abstract) -- On the power of memory in the design of collision resistant hash functions -- A practical digital multisignature scheme based on discrete logarithms (extended abstract) -- Group-oriented undeniable signature schemes without the assistance of a mutually trusted party -- Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract) -- Linear nonequivalence versus nonlinearity -- Constructing large cryptographically strong S-boxes -- Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept -- Cryptanalysis of LOKI 91 -- Cryptanalysis of summation generator -- Secure addition sequence and its applications on the server-aided secret computation protocols -- Subliminal channels for signature transfer and their application to signature distribution schemes -- A practical secret voting scheme for large scale elections -- Privacy for multi-party protocols -- New protocols for electronic money -- Modelling and analyzing cryptographic protocols using Petri nets -- On verifiable implicit asking protocols for RSA computation -- Modified Maurer-Yacobi's scheme and its applications -- The vulnerability of geometric sequences based on fields of odd characteristic -- A fast cryptographic checksum algorithm based on stream ciphers -- An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure -- Construction of m-ary de Bruijn sequences (extended abstract) -- Information technology security standards — An Australian perspective -- Non-interactive generation of shared pseudorandom sequences -- A generalized description of DES-based and Benes-based permutationgenerators -- Prime generation with the Demytko-Miller-Trbovich algorithm -- Constructions of feebly-one-way families of permutations -- On bit correlations among preimages of “Many to one” One-way functions -- The fast cascade exponentiation algorithm and its applications on cryptography -- The design of a conference key distribution system -- Remarks on “The design of a Conference Key Distribution System” -- Public-key cryptosystem based on the discrete logarithm problem -- Elliptic curves over F p suitable for cryptosystems -- The probability Distribution of the Diffie-Hellman Key -- A modular exponentiation unit based on systolic arrays -- A comparison of key distribution patterns constructed from circle geometries -- A block cipher method using combinations of different methods under the control of the user key -- An attack on two hash functions by Zheng-Matsumoto-Imai -- Primality testing with Lucas functions.
In: Springer eBooksSummary: This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Threshold cryptosystems -- Authentication codes with perfect protection -- Practical proven secure authentication with arbitration -- Authentication codes under impersonation attack -- Cumulative arrays and geometric secret sharing schemes -- Nonperfect secret sharing schemes -- A construction of practical secret sharing schemes using linear block codes -- HAVAL — A one-way hashing algorithm with variable length of output (extended abstract) -- On the power of memory in the design of collision resistant hash functions -- A practical digital multisignature scheme based on discrete logarithms (extended abstract) -- Group-oriented undeniable signature schemes without the assistance of a mutually trusted party -- Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract) -- Linear nonequivalence versus nonlinearity -- Constructing large cryptographically strong S-boxes -- Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept -- Cryptanalysis of LOKI 91 -- Cryptanalysis of summation generator -- Secure addition sequence and its applications on the server-aided secret computation protocols -- Subliminal channels for signature transfer and their application to signature distribution schemes -- A practical secret voting scheme for large scale elections -- Privacy for multi-party protocols -- New protocols for electronic money -- Modelling and analyzing cryptographic protocols using Petri nets -- On verifiable implicit asking protocols for RSA computation -- Modified Maurer-Yacobi's scheme and its applications -- The vulnerability of geometric sequences based on fields of odd characteristic -- A fast cryptographic checksum algorithm based on stream ciphers -- An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure -- Construction of m-ary de Bruijn sequences (extended abstract) -- Information technology security standards — An Australian perspective -- Non-interactive generation of shared pseudorandom sequences -- A generalized description of DES-based and Benes-based permutationgenerators -- Prime generation with the Demytko-Miller-Trbovich algorithm -- Constructions of feebly-one-way families of permutations -- On bit correlations among preimages of “Many to one” One-way functions -- The fast cascade exponentiation algorithm and its applications on cryptography -- The design of a conference key distribution system -- Remarks on “The design of a Conference Key Distribution System” -- Public-key cryptosystem based on the discrete logarithm problem -- Elliptic curves over F p suitable for cryptosystems -- The probability Distribution of the Diffie-Hellman Key -- A modular exponentiation unit based on systolic arrays -- A comparison of key distribution patterns constructed from circle geometries -- A block cipher method using combinations of different methods under the control of the user key -- An attack on two hash functions by Zheng-Matsumoto-Imai -- Primality testing with Lucas functions.

This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.

There are no comments on this title.

to post a comment.

Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha