Advances in Cryptology - AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings. 1st ed. 1993
- 種類:
- 電子ブック
- 責任表示:
- edited by Jennifer Seberry, Yuliang Zheng
- 出版情報:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1993
- 著者名:
- シリーズ名:
- Lecture Notes in Computer Science ; 718
- ISBN:
- 9783540479765 [3540479767]
- 注記:
- Threshold cryptosystems -- Authentication codes with perfect protection -- Practical proven secure authentication with arbitration -- Authentication codes under impersonation attack -- Cumulative arrays and geometric secret sharing schemes -- Nonperfect secret sharing schemes -- A construction of practical secret sharing schemes using linear block codes -- HAVAL — A one-way hashing algorithm with variable length of output (extended abstract) -- On the power of memory in the design of collision resistant hash functions -- A practical digital multisignature scheme based on discrete logarithms (extended abstract) -- Group-oriented undeniable signature schemes without the assistance of a mutually trusted party -- Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract) -- Linear nonequivalence versus nonlinearity -- Constructing large cryptographically strong S-boxes -- Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept --
This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography. - ローカル注記:
- 学内専用E-BOOKS (local access only)
類似資料:
Springer Berlin Heidelberg : Imprint: Springer | |
Springer Berlin Heidelberg : Imprint: Springer |
Springer Berlin Heidelberg : Imprint: Springer |
Springer Berlin Heidelberg : Imprint: Springer |
Springer Berlin Heidelberg : Imprint: Springer |
Springer Berlin Heidelberg : Imprint: Springer | |
Springer Berlin Heidelberg : Imprint: Springer |
Springer Berlin Heidelberg : Imprint: Springer |
Springer Berlin Heidelberg : Imprint: Springer |
Springer Berlin Heidelberg : Imprint: Springer |