Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Advances in Cryptology
Proceedings of Crypto 83
Taschenbuch von David Chaum
Sprache: Englisch

53,49 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Aktuell nicht verfügbar

Kategorien:
Beschreibung
An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be that many sense the importance and potential consequences of this work, as we move into the information age. I believe that the various meetings devoted to cryptology over the past few years have contributed quite significantly to the formation of this community, by allowing those in the field to get to know each other and by providing for rapid exchange of ideas. CRYPTO 83 was once again truly the cryptologic event of the year. Many of the most active participants continue to attend each year, and attendance continues to grow at a healthy rate. The informal and collegial atmosphere and the beach side setting which contribute to the popularity of the event were again supported by flawless weather. The absence of parallel sessions seemed to provide a welcome opportunity to keep abreast of developments in the various areas of activity. Each session of the meeting organized by the program committee is repre­ sented by a section in the present volume. The papers were accepted by the program committee based on abstracts, and appear here without having been otherwise refereed. The last section contains papers presented at the informal rump session. A keyword index and an author index to the papers is provided at the end of the volume.
An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be that many sense the importance and potential consequences of this work, as we move into the information age. I believe that the various meetings devoted to cryptology over the past few years have contributed quite significantly to the formation of this community, by allowing those in the field to get to know each other and by providing for rapid exchange of ideas. CRYPTO 83 was once again truly the cryptologic event of the year. Many of the most active participants continue to attend each year, and attendance continues to grow at a healthy rate. The informal and collegial atmosphere and the beach side setting which contribute to the popularity of the event were again supported by flawless weather. The absence of parallel sessions seemed to provide a welcome opportunity to keep abreast of developments in the various areas of activity. Each session of the meeting organized by the program committee is repre­ sented by a section in the present volume. The papers were accepted by the program committee based on abstracts, and appear here without having been otherwise refereed. The last section contains papers presented at the informal rump session. A keyword index and an author index to the papers is provided at the end of the volume.
Inhaltsverzeichnis
Session I: Algorithms and Theory.- Knapsack Public Key Cryptosystems and Diophantine Approximation (Extended Abstract).- Solving Low Density Knapsacks.- Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems (Abstract).- On the Power of Cascade Ciphers (Extended Abstract).- The Prisoners' Problem and the Subliminal Channel.- Session II: Modes of Operation.- An Overview of Factoring.- New Ideas for Factoring Large Integers.- Factoring Numbers on the Massively Parallel Computer.- Factorization Using the Quadratic Sieve Algorithm.- Session III: Protocols and Transaction Security.- Signatures through Approximate Representations by Quadratic Forms (Extended Abstract).- A Simple Protocol for Signing Contracts.- Reducibility among Protocols (Extended Abstract).- How to Exchange Half a Bit.- Blind Signature System (Abstract).- Session IV: Applications.- A Layered Broadcast Cryptographic System.- Analytical Characteristics of the DES.- Producing a One-Way Hash Function from DES.- On the Security of Compressed Encodings.- Field Encryption and Authentication.- Shift-Register Synthesis (Modulo m) (Abstract).- Session V: Special Session on Cryptanalysis.- Probabilistic Analysis and Performance Modelling of the 'Swedish' Algorithm and Modifications.- A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p2).- Permutation Polynomials in RSA-Cryptosystems.- Some Results on the Information Theoretic Analysis of Cryptosystems.- Rump Session: Impromptu Talks.- Improving the Security of Exponential Key Exchange.- RSA Bits Are 732+? Secure (Preliminary Abstract).- Use of the 'Signature Token' to Create a Negotiable Document.- Electronic Wallet.- Design Concepts for Tamper Responding Systems.- Author Index.
Details
Erscheinungsjahr: 2012
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: xii
396 S.
ISBN-13: 9781468447323
ISBN-10: 1468447327
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Redaktion: Chaum, David
Herausgeber: David Chaum
Auflage: Softcover reprint of the original 1st ed. 1984
Hersteller: Springer US
Springer US, New York, N.Y.
Maße: 254 x 178 x 23 mm
Von/Mit: David Chaum
Erscheinungsdatum: 14.03.2012
Gewicht: 0,764 kg
Artikel-ID: 105627994
Inhaltsverzeichnis
Session I: Algorithms and Theory.- Knapsack Public Key Cryptosystems and Diophantine Approximation (Extended Abstract).- Solving Low Density Knapsacks.- Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems (Abstract).- On the Power of Cascade Ciphers (Extended Abstract).- The Prisoners' Problem and the Subliminal Channel.- Session II: Modes of Operation.- An Overview of Factoring.- New Ideas for Factoring Large Integers.- Factoring Numbers on the Massively Parallel Computer.- Factorization Using the Quadratic Sieve Algorithm.- Session III: Protocols and Transaction Security.- Signatures through Approximate Representations by Quadratic Forms (Extended Abstract).- A Simple Protocol for Signing Contracts.- Reducibility among Protocols (Extended Abstract).- How to Exchange Half a Bit.- Blind Signature System (Abstract).- Session IV: Applications.- A Layered Broadcast Cryptographic System.- Analytical Characteristics of the DES.- Producing a One-Way Hash Function from DES.- On the Security of Compressed Encodings.- Field Encryption and Authentication.- Shift-Register Synthesis (Modulo m) (Abstract).- Session V: Special Session on Cryptanalysis.- Probabilistic Analysis and Performance Modelling of the 'Swedish' Algorithm and Modifications.- A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p2).- Permutation Polynomials in RSA-Cryptosystems.- Some Results on the Information Theoretic Analysis of Cryptosystems.- Rump Session: Impromptu Talks.- Improving the Security of Exponential Key Exchange.- RSA Bits Are 732+? Secure (Preliminary Abstract).- Use of the 'Signature Token' to Create a Negotiable Document.- Electronic Wallet.- Design Concepts for Tamper Responding Systems.- Author Index.
Details
Erscheinungsjahr: 2012
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: xii
396 S.
ISBN-13: 9781468447323
ISBN-10: 1468447327
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Redaktion: Chaum, David
Herausgeber: David Chaum
Auflage: Softcover reprint of the original 1st ed. 1984
Hersteller: Springer US
Springer US, New York, N.Y.
Maße: 254 x 178 x 23 mm
Von/Mit: David Chaum
Erscheinungsdatum: 14.03.2012
Gewicht: 0,764 kg
Artikel-ID: 105627994
Warnhinweis

Ähnliche Produkte