Description
It is our pleasure to thank dl those uho contributed to nial\ing thew proceeding\ possible: the authors. progriimme committee. organihing committee, I4C.K otticfrh and directors, and all the attendees. We were all deeplq saddened nhen ne lemied th,it Tore Ilerle~tam. J member 01 the programme committee, had died unexpsctedl\ Thi\ olunie I\ dedicated to liim Amsterdum, the Netherlirnds London, Englund Junuur,, 1988 __~ ...~~~. ~ ~ ~ I. Advances in C'r>ptolog?: .A Report on C'RY t'TO Si. Allen Cirr\lio. k.d. L 04. Department of P.lectrica1 and ('omputcr Engineering, S'iiita Harhara 2. C'ryptography: Proceeding\. Burg keusrwiii lYX2 (I.ecturr biotr5 in C'omptitcr Scicncr: 149). I li- mas Beth, Ed. Springer-Verlag. 1983. 3. Advanccs in C'rytology: Proceedings cif C'KY'PTO S2, I),]\ id ('hauin. Ronald L KiLcsi. and Al~n I Sherman. Eds. Plenum NY. 1YX3. 4. Advances in C'ryptology: Proceeding5 of C'K)'f)l.O S3. D;i\id ('hiiuni, kd. I'Icnuiii XY. IY84. IV ~~~ ~ ~~~_.______ 5 4dbances in Crqptolog>: Proceeding, of C'RYP'TO X4 (Lecture Notes in Computer Science: 196). G.R. Blakley and Ua\ id ('haurn. Eda. Springer-Verlag, 19x5. 6. .Advances in CTptology: Proceeding\ of C'RYPTO X5 (Lecture Notes in C'oiiiputer Sc~encc: 2 IX).
tlugh C. Williams. Ed. Springer-Vrrl:ig. 1986. 7. Advances in Cqptologq : Proceedings of C'RYP10 80 (Lecture h'cite\ in C'ornputer Scwncc: 263). A.hl Odlyzko. td. Springer-Verlag. 1987. 8. No proceedings were published for ECROCRYP7 X3. which w:i\ held in Udiiie Ital?.
Table of Contents
Sequences And Linear Complexity.- In Memoriam Tore Herlestam (1929-1986).- Alternating Step Generators Controlled by De Bruijn Sequences.- Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution.- Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators.- Sequences with Almost Perfect Linear Complexity Profile.- When Shift Registers Clock Themselves.- Finite State Machine Modelling of Cryptographic Systems in Loops.- Hardware Topics.- Random Sources for Cryptographic Systems.- Physical Protection of Cryptographic Devices.- The RSA Cryptography Processor.- Public Key Topics.- Extension of Brickell'S Algorithm for Breaking High Density Knapsacks.- On Privacy Homomorphisms (Extended Abstract).- An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations.- A Public Key Analog Gyptosystem.- Authentication and Secure Transactions.- Message Authentication with Arbitration of Transmitter/Receiver Disputes.- Perfect and Essentially Perfect Authentication Schemes.- Message Authentication and Dynamic Passwords.- IC-Cards in High-Security Applications.- Hash Functions and Signatures.- Collision Free Hash Functions and Public Key Signature Schemes.- Hash-Functions Using Modulo-N Operations.- Blinding for Unanticipated Signatures.- Symmetric Ciphers: Theory.- Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers.- Linear Structures in Blockciphers.- Fast Data Encipherment Algorithm FEAL.- Symmetric Ciphers: Application.- Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping.- Security Considerations in the Design and Implementation of a new DES chip.- High-Performance Interface Architectures for Cryptographic Hardware.
by "Nielsen BookData"