Advances in Cryptology – EUROCRYPT ’97: International Conference on the Theory and Application of Cryptographic Techniques Konstanz, Germany, May 11–15, 1997 Proceedings

Author:   Walter Fumy
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   1997 ed.
Volume:   1233
ISBN:  

9783540629757


Pages:   509
Publication Date:   29 April 1997
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Advances in Cryptology – EUROCRYPT ’97: International Conference on the Theory and Application of Cryptographic Techniques Konstanz, Germany, May 11–15, 1997 Proceedings


Add your own review!

Overview

This text constitutes the refereed proceedings of the 15th Conference on the Theory and Application of Cryptographic Techniques. The 34 revised full papers included were carefully selected from a total of 104 submissions. The papers addresses issues such as the booming area of research and development in cryptology and advances in application areas including security and privacy, digital communication, and electronic commerce.

Full Product Details

Author:   Walter Fumy
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   1997 ed.
Volume:   1233
Dimensions:   Width: 15.50cm , Height: 2.70cm , Length: 23.50cm
Weight:   0.795kg
ISBN:  

9783540629757


ISBN 10:   3540629750
Pages:   509
Publication Date:   29 April 1997
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Block Ciphers.- Two Attacks on Reduced IDEA.- Combinatorial Properties of Basic Encryption Operations.- Public Key Systems.- A New Public-Key Cryptosystem.- On the Importance of Checking Cryptographic Protocols for Faults.- Lattice Attacks on NTRU.- Protocols.- Kleptography: Using Cryptography Against Cryptography.- Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation.- Anonymous Fingerprinting.- A Secure and Optimally Efficient Multi-Authority Election Scheme.- Key Escrow.- Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals.- The GCHQ Protocol and Its Problems.- Hash-Functions.- Bucket Hashing with a Small Key Size.- A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost.- Information Theory.- Smooth Entropy and Renyi Entropy.- Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion.- Stream Ciphers.- Linear Statistical Weakness of Alleged RC4 Keystream Generator.- Cryptanalysis of Alleged A5 Stream Cipher.- Complexity Theory.- Lower Bounds for Discrete Logarithms and Related Problems.- Stronger Security Proofs for RSA and Rabin Bits.- Round-Optimal Zero-Knowledge Arguments Based on Any One-Way Function.- Efficient Cryptographic Protocols Based on Noisy Channels.- Rapid Demonstration of Linear Relations Connected by Boolean Operators.- Oblivious Transfers and Privacy Amplification.- Implementation.- SHA: A Design for Parallel Architectures?.- Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2n)m).- Finding Good Random Elliptic Curves for Cryptosystems Defined over .- Authentication.- Incremental Cryptography and Memory Checkers.- Almost k-wise Independent Sample Spaces and Their Cryptologic Applications.- Boolean Functions.- More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings.- Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria.- Signatures.- Distributed Magic Ink Signatures.- Efficient and Generalized Group Signatures.- Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees.- Selective Forgery of RSA Signatures Using Redundancy.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List