Public-key cryptography : state of the art and future directions : E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991 : final report
Author(s)
Bibliographic Information
Public-key cryptography : state of the art and future directions : E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991 : final report
(Lecture notes in computer science, 578)
Springer-Verlag, c1992
- : gw
- : us
Available at / 48 libraries
-
Library, Research Institute for Mathematical Sciences, Kyoto University数研
: gwL/N||LNCS||57892003924
-
Kochi University of Technology.Library
: Berlin007||L49||578000171884,
: gw007||L49||57800017188 -
University of Tsukuba Library, Library on Library and Information Science
: Berlin007.08:L-49:578921000550
-
No Libraries matched.
- Remove all filters.
Note
Bibliography: p. [83]-97
Description and Table of Contents
Description
This report on the state of the art and future directions of
public-key cryptography is published in accordance with the
terms of reference of the European Institute for System
Security (EISS). The EISS was founded in 1988 by cabinet
resolution of the state government of Baden-W}rttemberg and
its basic task is scientific research and knowledge transfer
in the field of security in telecommunications and computer
and information systems.
This report gives the results of an EISS workshop on
public-keycryptography and contains seven chapters: an
introduction, the scope of the workshop, the topics chosen,
classification and description of the most prominent
public-key systems, the dependence of public-key
cryptography on computational number theory, mistakes and
problems with public-key systems, and a projection of needs
and requirements for public-key systems.
It is addressed to all members of the computer science
community: systems developers, researchers, decision makers,
standardization committees, patent offices, and users and
customers of secure computer systems.
Table of Contents
Scope of the workshop.- List of topics chosen through self-assessment.- Short classification and description of the most prominent public-key systems.- Public-key cryptography depending on computational number theory.- Public-key systems: Mistakes and problems.- Projection of needs and requirements for public-key systems.
by "Nielsen BookData"