Advances in Cryptology -

Advances in Cryptology

Proceedings of Crypto 83

David Chaum (Herausgeber)

Buch | Softcover
396 Seiten
2012 | Softcover reprint of the original 1st ed. 1984
Springer-Verlag New York Inc.
978-1-4684-4732-3 (ISBN)
53,49 inkl. MwSt
An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be that many sense the importance and potential consequences of this work, as we move into the information age. I believe that the various meetings devoted to cryptology over the past few years have contributed quite significantly to the formation of this community, by allowing those in the field to get to know each other and by providing for rapid exchange of ideas. CRYPTO 83 was once again truly the cryptologic event of the year. Many of the most active participants continue to attend each year, and attendance continues to grow at a healthy rate. The informal and collegial atmosphere and the beach side setting which contribute to the popularity of the event were again supported by flawless weather. The absence of parallel sessions seemed to provide a welcome opportunity to keep abreast of developments in the various areas of activity. Each session of the meeting organized by the program committee is repre­ sented by a section in the present volume. The papers were accepted by the program committee based on abstracts, and appear here without having been otherwise refereed. The last section contains papers presented at the informal rump session. A keyword index and an author index to the papers is provided at the end of the volume.

Session I: Algorithms and Theory.- Knapsack Public Key Cryptosystems and Diophantine Approximation (Extended Abstract).- Solving Low Density Knapsacks.- Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems (Abstract).- On the Power of Cascade Ciphers (Extended Abstract).- The Prisoners’ Problem and the Subliminal Channel.- Session II: Modes of Operation.- An Overview of Factoring.- New Ideas for Factoring Large Integers.- Factoring Numbers on the Massively Parallel Computer.- Factorization Using the Quadratic Sieve Algorithm.- Session III: Protocols and Transaction Security.- Signatures through Approximate Representations by Quadratic Forms (Extended Abstract).- A Simple Protocol for Signing Contracts.- Reducibility among Protocols (Extended Abstract).- How to Exchange Half a Bit.- Blind Signature System (Abstract).- Session IV: Applications.- A Layered Broadcast Cryptographic System.- Analytical Characteristics of the DES.- Producing a One-Way Hash Function from DES.- On the Security of Compressed Encodings.- Field Encryption and Authentication.- Shift-Register Synthesis (Modulo m) (Abstract).- Session V: Special Session on Cryptanalysis.- Probabilistic Analysis and Performance Modelling of the ‘Swedish’ Algorithm and Modifications.- A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p2).- Permutation Polynomials in RSA-Cryptosystems.- Some Results on the Information Theoretic Analysis of Cryptosystems.- Rump Session: Impromptu Talks.- Improving the Security of Exponential Key Exchange.- RSA Bits Are 732+? Secure (Preliminary Abstract).- Use of the ‘Signature Token’ to Create a Negotiable Document.- Electronic Wallet.- Design Concepts for Tamper Responding Systems.- Author Index.

Zusatzinfo XII, 396 p.
Verlagsort New York, NY
Sprache englisch
Maße 178 x 254 mm
Themenwelt Schulbuch / Wörterbuch Lexikon / Chroniken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Naturwissenschaften Chemie Physikalische Chemie
Sozialwissenschaften
ISBN-10 1-4684-4732-7 / 1468447327
ISBN-13 978-1-4684-4732-3 / 9781468447323
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00