Advances in cryptology : proceedings of Crypto 83
著者
書誌事項
Advances in cryptology : proceedings of Crypto 83
Plenum Press, c1984
大学図書館所蔵 全14件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
"Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, held August 21-24, 1983, at the University of California, in Santa Barbara, California"--T.p. verso
Includes bibliographies and indexes
内容説明・目次
内容説明
An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be that many sense the importance and potential consequences of this work, as we move into the information age. I believe that the various meetings devoted to cryptology over the past few years have contributed quite significantly to the formation of this community, by allowing those in the field to get to know each other and by providing for rapid exchange of ideas. CRYPTO 83 was once again truly the cryptologic event of the year. Many of the most active participants continue to attend each year, and attendance continues to grow at a healthy rate. The informal and collegial atmosphere and the beach side setting which contribute to the popularity of the event were again supported by flawless weather. The absence of parallel sessions seemed to provide a welcome opportunity to keep abreast of developments in the various areas of activity. Each session of the meeting organized by the program committee is repre- sented by a section in the present volume.
The papers were accepted by the program committee based on abstracts, and appear here without having been otherwise refereed. The last section contains papers presented at the informal rump session. A keyword index and an author index to the papers is provided at the end of the volume.
目次
Session I: Algorithms and Theory.- Knapsack Public Key Cryptosystems and Diophantine Approximation (Extended Abstract).- Solving Low Density Knapsacks.- Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems (Abstract).- On the Power of Cascade Ciphers (Extended Abstract).- The Prisoners' Problem and the Subliminal Channel.- Session II: Modes of Operation.- An Overview of Factoring.- New Ideas for Factoring Large Integers.- Factoring Numbers on the Massively Parallel Computer.- Factorization Using the Quadratic Sieve Algorithm.- Session III: Protocols and Transaction Security.- Signatures through Approximate Representations by Quadratic Forms (Extended Abstract).- A Simple Protocol for Signing Contracts.- Reducibility among Protocols (Extended Abstract).- How to Exchange Half a Bit.- Blind Signature System (Abstract).- Session IV: Applications.- A Layered Broadcast Cryptographic System.- Analytical Characteristics of the DES.- Producing a One-Way Hash Function from DES.- On the Security of Compressed Encodings.- Field Encryption and Authentication.- Shift-Register Synthesis (Modulo m) (Abstract).- Session V: Special Session on Cryptanalysis.- Probabilistic Analysis and Performance Modelling of the 'Swedish' Algorithm and Modifications.- A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p2).- Permutation Polynomials in RSA-Cryptosystems.- Some Results on the Information Theoretic Analysis of Cryptosystems.- Rump Session: Impromptu Talks.- Improving the Security of Exponential Key Exchange.- RSA Bits Are 732+? Secure (Preliminary Abstract).- Use of the 'Signature Token' to Create a Negotiable Document.- Electronic Wallet.- Design Concepts for Tamper Responding Systems.- Author Index.
「Nielsen BookData」 より