Advances in cryptology : proceedings of Crypto 83

書誌事項

Advances in cryptology : proceedings of Crypto 83

edited by David Chaum

Plenum Press, c1984

大学図書館所蔵 件 / 14

この図書・雑誌をさがす

注記

"Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, held August 21-24, 1983, at the University of California, in Santa Barbara, California"--T.p. verso

Includes bibliographies and indexes

内容説明・目次

内容説明

An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be that many sense the importance and potential consequences of this work, as we move into the information age. I believe that the various meetings devoted to cryptology over the past few years have contributed quite significantly to the formation of this community, by allowing those in the field to get to know each other and by providing for rapid exchange of ideas. CRYPTO 83 was once again truly the cryptologic event of the year. Many of the most active participants continue to attend each year, and attendance continues to grow at a healthy rate. The informal and collegial atmosphere and the beach side setting which contribute to the popularity of the event were again supported by flawless weather. The absence of parallel sessions seemed to provide a welcome opportunity to keep abreast of developments in the various areas of activity. Each session of the meeting organized by the program committee is repre- sented by a section in the present volume. The papers were accepted by the program committee based on abstracts, and appear here without having been otherwise refereed. The last section contains papers presented at the informal rump session. A keyword index and an author index to the papers is provided at the end of the volume.

目次

Session I: Algorithms and Theory.- Knapsack Public Key Cryptosystems and Diophantine Approximation (Extended Abstract).- Solving Low Density Knapsacks.- Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems (Abstract).- On the Power of Cascade Ciphers (Extended Abstract).- The Prisoners' Problem and the Subliminal Channel.- Session II: Modes of Operation.- An Overview of Factoring.- New Ideas for Factoring Large Integers.- Factoring Numbers on the Massively Parallel Computer.- Factorization Using the Quadratic Sieve Algorithm.- Session III: Protocols and Transaction Security.- Signatures through Approximate Representations by Quadratic Forms (Extended Abstract).- A Simple Protocol for Signing Contracts.- Reducibility among Protocols (Extended Abstract).- How to Exchange Half a Bit.- Blind Signature System (Abstract).- Session IV: Applications.- A Layered Broadcast Cryptographic System.- Analytical Characteristics of the DES.- Producing a One-Way Hash Function from DES.- On the Security of Compressed Encodings.- Field Encryption and Authentication.- Shift-Register Synthesis (Modulo m) (Abstract).- Session V: Special Session on Cryptanalysis.- Probabilistic Analysis and Performance Modelling of the 'Swedish' Algorithm and Modifications.- A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p2).- Permutation Polynomials in RSA-Cryptosystems.- Some Results on the Information Theoretic Analysis of Cryptosystems.- Rump Session: Impromptu Talks.- Improving the Security of Exponential Key Exchange.- RSA Bits Are 732+? Secure (Preliminary Abstract).- Use of the 'Signature Token' to Create a Negotiable Document.- Electronic Wallet.- Design Concepts for Tamper Responding Systems.- Author Index.

「Nielsen BookData」 より

詳細情報

ページトップへ