Advances in Cryptology: Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - by Thomas BethAdvances in Cryptology: Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - by Thomas Beth

Advances in Cryptology: Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of…

EditorThomas Beth, Norbert Cot, Ingemar Ingemarsson

Paperback | December 1, 1985

Pricing and Purchase Info

$85.74 online 
$90.95 list price save 5%
Earn 429 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

Title:Advances in Cryptology: Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of…Format:PaperbackDimensions:489 pagesPublished:December 1, 1985Publisher:Springer Berlin HeidelbergLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540160760

ISBN - 13:9783540160762

Reviews

Table of Contents

General Theory, Classical Methods.- Cryptology and Complexity Theories.- On Cryptosystems Based on Polynomials and Finite Fields.- Algebraical Structures of Cryptographic Transformations.- Non Linear Non Commutative Functions for Data Integrity.- Wire-Tap Channel II.- Equivocations for Homophonic Ciphers.- Propagation Characteristics of the DES.- Linear Ciphers and Random Sequence Generators with Multiple Clocks.- The Stop-and-Go-Generator.- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers.- On the linear complexity of cascaded sequences.- Public-Key Systems.- RSA-bits are 0.5 + ? secure.- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA's L.S.B) (Extended Abstract).- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme.- A New Trapdoor Knapsack Public Key Cryptosystem.- RSA Chips (Past/Present/Future) (Extended abstract).- Number Theoretical Papers.- The Quadratic Sieve Factoring Algorithm.- Status Report on Factoring (At the Sandia National Laboratories).- Strong Primes are Easy to Find.- Discrete logarithms in finite fields and their cryptographic significance.- Channels, Networks, Key Distribution, Protocols.- User Functions for the Generation and Distribution of Encipherment Keys.- An Optimal Class of Symmetric Key Generation Systems.- On the Use of the Binary Multiplying Channel in a Private Communication System.- Secrecy and Privacy in a Local Area Network Environment.- The Subliminal Channel and Digital Signatures.- A Provably Secure Oblivious Transfer Protocol.- On Concurrent Identification Protocols (Extended Abstract).- Applications.- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System.- Security of Transportable Computerized Files.- Encryption and Key Management for the ECS Statellite Service.- An Encryption and Authentification Procedure for Telesurveillance Systems.- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques.- Smart Cards.- Session on Smart Cards Tuesday April 10.- Smart Card Applications in Security and Data Protection.- Bull CP8 Smart Card Uses in Cryptology.- Estimation of some Encryption Functions Implemented into Smart Cards.- Smart Cards and Conditional Access.