Contemporary cryptology : the science of information integrity

Bibliographic Information

Contemporary cryptology : the science of information integrity

edited by Gustavus J. Simmons

IEEE Press, 1991, c1992

  • : N.Y.

Available at  / 24 libraries

Search this Book/Journal

Note

"The Institute of Electrical and Electronics Engineers, Inc., New York."

Includes bibliographical references and index

"IEEE order number: PC0271-7"--T.p. verso

"IEEE order number: PP2717"--T.p. verso (N.Y.)

Description and Table of Contents

Description

Contemporary Cryptology The Science of Information Integrity The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers. Also of Interest Advances in Adaptive Control Edited by Kumpati S. Narendra, Romeo Ortega, and Peter Dorato Sponsored by the IEEE Control Systems Society With the advent of more and more sophisticated computers, complex control strategies, such as adaptive control, are becoming more prevalent. This volume provides an in-depth review of recent applications reported at major control conferences. Some of these developments are in established areas of adaptive control, while others represent theoretical breakthrough and novel applications. Much of this material does not appear elsewhere or is difficult to access. Of interest to engineers working in process control, flight control, robotics, automobile control, space control applications, manufacturing systems. 1991 ISBN 0-87942-278-5 Order No. PC0272-5 Hardcover 424 pp Information Technology for Command and Control Methods and Tools for Systems Development and Evaluation Edited by Stephen J. Andriole and Stanley M. Halpin Sponsored by the IEEE Systems, Man, and Cybernetics Society The C 2 marketplace is USD40 billion annually. This is the only book to zero in on the process by which C 2 decisions and information system requirements are identified, modeled, and validated. It provides the essentials for building systems that help allocate resources, make plans, and monitor environments. Leveraging specific tools and techniques to multiple areas of application, global networking, and interactive decision-making support systems, the role of artificial intelligence in drawing inferences and avoiding mistakes, and the uses of user-computer interface technology are just some of the many components of C 2 presented in this book. Of interest to all information systems professionals, computer scientists, human factors professionals, and all command and control personnel. 1991 ISBN 0-87942-270-X Order PC0264-2 Hardcover 584 pp

Table of Contents

  • Contemporary Cryptology: A Foreword - G. Simmons
  • Contemporary Cryptology: An Introduction - J. Massey
  • CRYPTOGRAPHY
  • The Data Encryption Standard: Past and Future - M. Smid & D. Branstad
  • Stream Ciphers - R. Rueppel
  • The First Ten Years of Public Key Cryptology - W. Diffie
  • Public Key Cryptography - J. Nechvatal
  • A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms - P. van Oorschot
  • AUTHENTICATION
  • Digital Signatures - C. Mitchell, et al
  • A Survey of Information Authentication - G. Simmons
  • PROTOCOLS
  • Overview of Interactive Proof Systems and Zero-Knowledge - J. Feigenbaum
  • An Introduction to Shared Secret and/or Shared Control Schemes and Their Applications - G. Simmons
  • CRYPTANALYSIS
  • Cryptanalysis: A Survey of Recent Results - E. Brickell & A. Odlyzko
  • Protocol Failures in Cryptosystems - J. Moore
  • APPLICATIONS
  • The Smart Card: A Standardized Security Device Dedicated to Public Cryptology - L. Guillou, et al
  • How to Insure That Data Acquired to Verify Treaty Compliance are Trustworthy - G. Simmons
  • Index
  • Editor's Biography.

by "Nielsen BookData"

Details

Page Top