feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV035718221
    Format: 1 Online-Ressource (XV, 564 S. , Ill., graph. Darst.)
    ISBN: 3540578560 , 0387578560
    Series Statement: Lecture notes in computer science 783
    Language: English
    Subjects: Computer Science , Engineering
    RVK:
    RVK:
    RVK:
    Keywords: Mobilfunk ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV035801199
    Format: 1 Online-Ressource (XI, 467 S.)
    ISBN: 3540502513 , 0387502513
    Series Statement: Lecture notes in computer science 330
    Language: English
    Subjects: Computer Science , Mathematics
    RVK:
    RVK:
    Keywords: Kryptologie ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_BV008897373
    Format: XV, 564 S. : , Ill., graph. Darst.
    ISBN: 3-540-57856-0 , 0-387-57856-0
    Series Statement: Lecture notes in computer science 783
    Language: English
    Subjects: Computer Science , Engineering
    RVK:
    RVK:
    RVK:
    Keywords: Mobilfunk ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_BV006377737
    Format: XI, 467 S. : , graph. Darst.
    ISBN: 3-540-50251-3 , 0-387-50251-3
    Series Statement: Lecture notes in computer science 330
    Language: German
    Subjects: Computer Science , Mathematics
    RVK:
    RVK:
    Keywords: Kryptologie ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_1649275161
    Format: Online-Ressource
    ISBN: 9783540459613
    Series Statement: Lecture Notes in Computer Science 330
    Content: Key Distribution -- Key Agreements Based on Function Composition -- Security of Improved Identity-based Conference Key Distribution Systems -- Authentication -- Subliminal-free Authentication and Signature -- Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts -- Authentication Codes with Multiple Arbiters -- Some Constructions for Authentication - Secrecy Codes -- Efficient Zero-Knowledge Identification Scheme for Smart Cards -- Signatures -- A Smart Card Implementation of the Fiat-Shamir Identification Scheme -- Manipulations and Errors, Detection and Localization -- Privacy Protected Payments — Realization of a Protocol That Guarantees Payer Anonymity -- A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory -- A Generalized Birthday Attack -- Protocols -- An Interactive Data Exchange Protocol Based on Discrete Exponentiation -- Anonymous and Verifiable Registration in Databases -- Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA -- Passports and Visas Versus IDs -- Complexity and Number Theory -- The Probabilistic Theory of Linear Complexity -- A Probabilistic Primality Test Based on the Properties of Certain Generalized Lucas Numbers -- On the Construction of Random Number Generators and Random Function Generators -- Numerical Methods -- Factorization of Large Integers on a Massively Parallel Computer -- A Fast Modular Arithmetic Algorithm Using a Residue Table -- Fast Exponentiation in GF(2n) -- Fast RSA-Hardware: Dream or Reality? -- Cryptanalysis -- Properties of the Euler Totient Function Modulo 24 and Some of Its Cryptographic Implications -- An Observation on the Security of McEliece’s Public-Key Cryptosystem -- How to Break Okamoto’s Cryptosystem by Reducing Lattice Bases -- Cryptanalysis of F.E.A.L. -- Fast Correlation Attacks on Stream Ciphers -- Running-Key Ciphers -- A New Class of Nonlinear Functions for Running-key Generators -- Windmill Generators A generalization and an observation of how many there are -- Lock-in Effect in Cascades of Clock-Controlled Shift-Registers -- Proof of Massey’s Conjectured Algorithm -- Linear Recurring m-Arrays -- Cipher Theory and Threshold -- Substantial Number of Cryptographic Keys and Its Application to Encryption Designs -- A Measure of Semiequivocation -- Some New Classes of Geometric Threshold Schemes -- New Ciphers -- A Universal Algorithm for Homophonic Coding -- A New Probabilistic Encryption Scheme -- Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption -- Some Applications of Multiple Key Ciphers.
    Content: The International .4ssociation for Cryptologic Research (1.4CR) organizes tmo - ternational conferences every year, one in Europe and one in the 1-nited States. EUROCRYI’T’88. held in the beautiful environment of the S\~isb mountains in Davos, was the sixth European conference. The number of contributions and of participants at the meeting has increased substantiall!.. which is an indication of the high interest in cryptography and system security in general. The interest has not only increased but has also further moved towards - thentication. signatures and other protocols. This is easy to understand in view of the urgent needs for such protocols, in particular in connection with open - formation systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, 2.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems. was however also well represented and several significant results mere communicated. The present proceedings contain all contributions which were accepted for presentation. The chapters correspond to the sessions at the conference.
    Note: Literaturangaben
    Additional Edition: ISBN 9783540502517
    Additional Edition: Buchausg. u.d.T. Davos, Switzerland, May 25 - 27, 1988 1988 ISBN 3540502513
    Additional Edition: ISBN 0387502513
    Additional Edition: Druckausg. Advances in cryptology - EUROCRYPT '88 Berlin [u.a.] : Springer, 1988 ISBN 3540502513
    Additional Edition: ISBN 0387502513
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almafu_9959185684202883
    Format: 1 online resource (441 p.)
    Edition: 1st ed. 1988.
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 1-280-80454-8 , 9786610804542 , 3-540-45961-8
    Series Statement: Lecture Notes in Computer Science, 330
    Content: The International .4ssociation for Cryptologic Research (1.4CR) organizes tmo - ternational conferences every year, one in Europe and one in the 1-nited States. EUROCRYI’T’88. held in the beautiful environment of the S\~isb mountains in Davos, was the sixth European conference. The number of contributions and of participants at the meeting has increased substantiall!.. which is an indication of the high interest in cryptography and system security in general. The interest has not only increased but has also further moved towards - thentication. signatures and other protocols. This is easy to understand in view of the urgent needs for such protocols, in particular in connection with open - formation systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, 2.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems. was however also well represented and several significant results mere communicated. The present proceedings contain all contributions which were accepted for presentation. The chapters correspond to the sessions at the conference.
    Note: Description based upon print version of record. , Key Distribution -- Key Agreements Based on Function Composition -- Security of Improved Identity-based Conference Key Distribution Systems -- Authentication -- Subliminal-free Authentication and Signature -- Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts -- Authentication Codes with Multiple Arbiters -- Some Constructions for Authentication - Secrecy Codes -- Efficient Zero-Knowledge Identification Scheme for Smart Cards -- Signatures -- A Smart Card Implementation of the Fiat-Shamir Identification Scheme -- Manipulations and Errors, Detection and Localization -- Privacy Protected Payments — Realization of a Protocol That Guarantees Payer Anonymity -- A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory -- A Generalized Birthday Attack -- Protocols -- An Interactive Data Exchange Protocol Based on Discrete Exponentiation -- Anonymous and Verifiable Registration in Databases -- Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA -- Passports and Visas Versus IDs -- Complexity and Number Theory -- The Probabilistic Theory of Linear Complexity -- A Probabilistic Primality Test Based on the Properties of Certain Generalized Lucas Numbers -- On the Construction of Random Number Generators and Random Function Generators -- Numerical Methods -- Factorization of Large Integers on a Massively Parallel Computer -- A Fast Modular Arithmetic Algorithm Using a Residue Table -- Fast Exponentiation in GF(2n) -- Fast RSA-Hardware: Dream or Reality? -- Cryptanalysis -- Properties of the Euler Totient Function Modulo 24 and Some of Its Cryptographic Implications -- An Observation on the Security of McEliece’s Public-Key Cryptosystem -- How to Break Okamoto’s Cryptosystem by Reducing Lattice Bases -- Cryptanalysis of F.E.A.L. -- Fast Correlation Attacks on Stream Ciphers -- Running-Key Ciphers -- A New Class of Nonlinear Functions for Running-key Generators -- Windmill Generators A generalization and an observation of how many there are -- Lock-in Effect in Cascades of Clock-Controlled Shift-Registers -- Proof of Massey’s Conjectured Algorithm -- Linear Recurring m-Arrays -- Cipher Theory and Threshold -- Substantial Number of Cryptographic Keys and Its Application to Encryption Designs -- A Measure of Semiequivocation -- Some New Classes of Geometric Threshold Schemes -- New Ciphers -- A Universal Algorithm for Homophonic Coding -- A New Probabilistic Encryption Scheme -- Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption -- Some Applications of Multiple Key Ciphers. , English
    In: Springer eBooks
    Additional Edition: ISBN 3-540-50251-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_595125573
    Format: Online-Ressource (XV, 564 S.)
    Edition: Online-Ausg. Berlin [u.a.] Springer 2006 Springer lecture notes archive
    ISBN: 9783540483595
    Series Statement: Lecture notes in computer science 783
    Content: Personal communications -- The evolution of GSM -- Integrating data traffic in Enhanced-TDMA digital cellular systems -- The geometric Dynamic Channel Allocation strategy for high traffic FDM/TDMA mobile communications networks -- Performance evaluation of the DECT radio resource management -- The capacity of CDMA cellular: Reverse link field test results -- Adaptive multiuser detector for synchronous code division multiple access applications -- Concatenated coding scheme for reliable data transmission in CDMA cellular systems -- Performance of CDMA cellular networks with base-station antenna arrays -- Joint Frequency-Phase Modulation over Rayleigh fading channels -- Convolutional codes and finite interleavers for the block erasure channel -- Fractional-rate hybrid PSK-TCM codes for the Rayleigh fading channel -- Increased capacity of DS-CDMA mobile systems on frequency-selective slow fading channels -- Design and performance of an 8-dimensional modulation scheme -- Analysis of successive interference cancellation in M-ary Orthogonal DS-CDMA system with single path Rayleigh fading -- Simulation results for a CDMA Interference Cancellation technique in a Rayleigh fading channel -- Matched median detectors for synchronous direct-sequence multiple-access communications -- Cellular spectrum efficiency of a joint detection C/TDMA mobile radio system -- Multiple-symbol differential detection scheme for differential amplitude modulation -- Phase-correcting filter for sub-optimal equalizers -- Performance of adaptive equalization in typical indoor environments including non-linear power amplifiers -- New error probability upper bound on maximum likelihood sequence estimation for intersymbol interference channels -- Bit error probability of a rapidly-adapting rake receiver as a function of dwell time -- Near-far resistant propagation delay estimators for asynchronous direct-sequence code division multiple access systems -- Dynamic cell planning for wireless infrared in-house data transmission -- Frequency response measurements of the wireless indoor channel at infrared optics -- Propagation losses and impulse response of the indoor optical channel: A simulation package -- A 50 Mbit/s optical wireless lan link using novel optical and electronic enabling technologies -- Performance comparison of GMSK and ?/4-DQPSK modulations in a mobile radio environment -- The effect of modulation on the power rating of multi-channel linear amplifiers -- Simulation of GSM data channels in a safety critical railway environment -- A model for BER evaluation of indoor frequency selective channels using multipath measurement results at 2.4, 4.75 and 11.5 GHz -- Measuring bit errors, clock errors and their burst characteristics in mobile communication systems -- Performance of dynamic feedback power control in a TDMA radio system -- Performance of cellular radio systems with power control in varying shadow fading environments -- Power control on the forward link in cellular CDMA -- Performance analysis of a CDMA-based satellite-mobile audio broadcasting system -- Radio protocol architecture of the CODIT UMTS system -- RACE-II advanced TDMA mobile access project An approach for UMTS -- Multitone spread spectrum communication systems in a multipath Rician fading channel -- Slotted ALOHA with capture in a mobile radio environment -- Improved performance of mobile data networks using stack algorithms and receiver capture -- Contention resolution multiple access techniques for handling speech and data traffic on wireless networks -- Certain generalizations on the slotted collision channel without feedback -- Monolithic integration of a spread-spectrum transmitter and receiver front end for Wireless LAN applications -- A bit-serial CMOS digital IF-filter for mobile radio using an on-chip clock -- A 65-MHz digital chip-matched-filter for DS-spread spectrum applications -- Area-efficient viterbi decoders for complex rate-k/n convolutional and trellis codes -- Soft handoff extends CDMA cell coverage and increases reverse link capacity -- An architecture and methodology for mobile-executed cell hand-off in wireless ATM networks.
    Content: The Global System for Mobile Communication met with wide acceptance in 1993. Its technical conception has significant advantages over the first generation of cellular systems. Digital European Cordless Telecommunications will provide similar advantages. In Europe, the second generation of wireless communication is established and a Universal Mobile Telecommunications System is currently being conceived. All this leads to a natural subdivision of current research into four categories: new and improved usage of existing standards, signal processing algorithms that are simpler or closer to the optimum, forther development of existing systems, and work that will ultimately lead to new system proposals. This volume presents the proceedings of a seminar at which all these categories were covered.
    Note: Literaturangaben
    Additional Edition: ISBN 3540578560
    Additional Edition: ISBN 9783540578567
    Additional Edition: Erscheint auch als Druck-Ausgabe Mobile communications Berlin : Springer, 1994 ISBN 3540578560
    Additional Edition: ISBN 0387578560
    Language: English
    Subjects: Computer Science , Engineering
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Mobilfunk ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    edocfu_9959185684202883
    Format: 1 online resource (441 p.)
    Edition: 1st ed. 1988.
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 1-280-80454-8 , 9786610804542 , 3-540-45961-8
    Series Statement: Lecture Notes in Computer Science, 330
    Content: The International .4ssociation for Cryptologic Research (1.4CR) organizes tmo - ternational conferences every year, one in Europe and one in the 1-nited States. EUROCRYI’T’88. held in the beautiful environment of the S\~isb mountains in Davos, was the sixth European conference. The number of contributions and of participants at the meeting has increased substantiall!.. which is an indication of the high interest in cryptography and system security in general. The interest has not only increased but has also further moved towards - thentication. signatures and other protocols. This is easy to understand in view of the urgent needs for such protocols, in particular in connection with open - formation systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, 2.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems. was however also well represented and several significant results mere communicated. The present proceedings contain all contributions which were accepted for presentation. The chapters correspond to the sessions at the conference.
    Note: Description based upon print version of record. , Key Distribution -- Key Agreements Based on Function Composition -- Security of Improved Identity-based Conference Key Distribution Systems -- Authentication -- Subliminal-free Authentication and Signature -- Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts -- Authentication Codes with Multiple Arbiters -- Some Constructions for Authentication - Secrecy Codes -- Efficient Zero-Knowledge Identification Scheme for Smart Cards -- Signatures -- A Smart Card Implementation of the Fiat-Shamir Identification Scheme -- Manipulations and Errors, Detection and Localization -- Privacy Protected Payments — Realization of a Protocol That Guarantees Payer Anonymity -- A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory -- A Generalized Birthday Attack -- Protocols -- An Interactive Data Exchange Protocol Based on Discrete Exponentiation -- Anonymous and Verifiable Registration in Databases -- Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA -- Passports and Visas Versus IDs -- Complexity and Number Theory -- The Probabilistic Theory of Linear Complexity -- A Probabilistic Primality Test Based on the Properties of Certain Generalized Lucas Numbers -- On the Construction of Random Number Generators and Random Function Generators -- Numerical Methods -- Factorization of Large Integers on a Massively Parallel Computer -- A Fast Modular Arithmetic Algorithm Using a Residue Table -- Fast Exponentiation in GF(2n) -- Fast RSA-Hardware: Dream or Reality? -- Cryptanalysis -- Properties of the Euler Totient Function Modulo 24 and Some of Its Cryptographic Implications -- An Observation on the Security of McEliece’s Public-Key Cryptosystem -- How to Break Okamoto’s Cryptosystem by Reducing Lattice Bases -- Cryptanalysis of F.E.A.L. -- Fast Correlation Attacks on Stream Ciphers -- Running-Key Ciphers -- A New Class of Nonlinear Functions for Running-key Generators -- Windmill Generators A generalization and an observation of how many there are -- Lock-in Effect in Cascades of Clock-Controlled Shift-Registers -- Proof of Massey’s Conjectured Algorithm -- Linear Recurring m-Arrays -- Cipher Theory and Threshold -- Substantial Number of Cryptographic Keys and Its Application to Encryption Designs -- A Measure of Semiequivocation -- Some New Classes of Geometric Threshold Schemes -- New Ciphers -- A Universal Algorithm for Homophonic Coding -- A New Probabilistic Encryption Scheme -- Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption -- Some Applications of Multiple Key Ciphers. , English
    In: Springer eBooks
    Additional Edition: ISBN 3-540-50251-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    edoccha_9959185684202883
    Format: 1 online resource (441 p.)
    Edition: 1st ed. 1988.
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 1-280-80454-8 , 9786610804542 , 3-540-45961-8
    Series Statement: Lecture Notes in Computer Science, 330
    Content: The International .4ssociation for Cryptologic Research (1.4CR) organizes tmo - ternational conferences every year, one in Europe and one in the 1-nited States. EUROCRYI’T’88. held in the beautiful environment of the S\~isb mountains in Davos, was the sixth European conference. The number of contributions and of participants at the meeting has increased substantiall!.. which is an indication of the high interest in cryptography and system security in general. The interest has not only increased but has also further moved towards - thentication. signatures and other protocols. This is easy to understand in view of the urgent needs for such protocols, in particular in connection with open - formation systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, 2.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems. was however also well represented and several significant results mere communicated. The present proceedings contain all contributions which were accepted for presentation. The chapters correspond to the sessions at the conference.
    Note: Description based upon print version of record. , Key Distribution -- Key Agreements Based on Function Composition -- Security of Improved Identity-based Conference Key Distribution Systems -- Authentication -- Subliminal-free Authentication and Signature -- Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts -- Authentication Codes with Multiple Arbiters -- Some Constructions for Authentication - Secrecy Codes -- Efficient Zero-Knowledge Identification Scheme for Smart Cards -- Signatures -- A Smart Card Implementation of the Fiat-Shamir Identification Scheme -- Manipulations and Errors, Detection and Localization -- Privacy Protected Payments — Realization of a Protocol That Guarantees Payer Anonymity -- A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory -- A Generalized Birthday Attack -- Protocols -- An Interactive Data Exchange Protocol Based on Discrete Exponentiation -- Anonymous and Verifiable Registration in Databases -- Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA -- Passports and Visas Versus IDs -- Complexity and Number Theory -- The Probabilistic Theory of Linear Complexity -- A Probabilistic Primality Test Based on the Properties of Certain Generalized Lucas Numbers -- On the Construction of Random Number Generators and Random Function Generators -- Numerical Methods -- Factorization of Large Integers on a Massively Parallel Computer -- A Fast Modular Arithmetic Algorithm Using a Residue Table -- Fast Exponentiation in GF(2n) -- Fast RSA-Hardware: Dream or Reality? -- Cryptanalysis -- Properties of the Euler Totient Function Modulo 24 and Some of Its Cryptographic Implications -- An Observation on the Security of McEliece’s Public-Key Cryptosystem -- How to Break Okamoto’s Cryptosystem by Reducing Lattice Bases -- Cryptanalysis of F.E.A.L. -- Fast Correlation Attacks on Stream Ciphers -- Running-Key Ciphers -- A New Class of Nonlinear Functions for Running-key Generators -- Windmill Generators A generalization and an observation of how many there are -- Lock-in Effect in Cascades of Clock-Controlled Shift-Registers -- Proof of Massey’s Conjectured Algorithm -- Linear Recurring m-Arrays -- Cipher Theory and Threshold -- Substantial Number of Cryptographic Keys and Its Application to Encryption Designs -- A Measure of Semiequivocation -- Some New Classes of Geometric Threshold Schemes -- New Ciphers -- A Universal Algorithm for Homophonic Coding -- A New Probabilistic Encryption Scheme -- Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption -- Some Applications of Multiple Key Ciphers. , English
    In: Springer eBooks
    Additional Edition: ISBN 3-540-50251-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9947920998002882
    Format: VI, 383 p. , online resource.
    ISBN: 9783540459613
    Series Statement: Lecture Notes in Computer Science, 330
    Content: The International .4ssociation for Cryptologic Research (1.4CR) organizes tmo - ternational conferences every year, one in Europe and one in the 1-nited States. EUROCRYI’T’88. held in the beautiful environment of the S\~isb mountains in Davos, was the sixth European conference. The number of contributions and of participants at the meeting has increased substantiall!.. which is an indication of the high interest in cryptography and system security in general. The interest has not only increased but has also further moved towards - thentication. signatures and other protocols. This is easy to understand in view of the urgent needs for such protocols, in particular in connection with open - formation systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, 2.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems. was however also well represented and several significant results mere communicated. The present proceedings contain all contributions which were accepted for presentation. The chapters correspond to the sessions at the conference.
    Note: Key Distribution -- Key Agreements Based on Function Composition -- Security of Improved Identity-based Conference Key Distribution Systems -- Authentication -- Subliminal-free Authentication and Signature -- Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts -- Authentication Codes with Multiple Arbiters -- Some Constructions for Authentication - Secrecy Codes -- Efficient Zero-Knowledge Identification Scheme for Smart Cards -- Signatures -- A Smart Card Implementation of the Fiat-Shamir Identification Scheme -- Manipulations and Errors, Detection and Localization -- Privacy Protected Payments — Realization of a Protocol That Guarantees Payer Anonymity -- A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory -- A Generalized Birthday Attack -- Protocols -- An Interactive Data Exchange Protocol Based on Discrete Exponentiation -- Anonymous and Verifiable Registration in Databases -- Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA -- Passports and Visas Versus IDs -- Complexity and Number Theory -- The Probabilistic Theory of Linear Complexity -- A Probabilistic Primality Test Based on the Properties of Certain Generalized Lucas Numbers -- On the Construction of Random Number Generators and Random Function Generators -- Numerical Methods -- Factorization of Large Integers on a Massively Parallel Computer -- A Fast Modular Arithmetic Algorithm Using a Residue Table -- Fast Exponentiation in GF(2n) -- Fast RSA-Hardware: Dream or Reality? -- Cryptanalysis -- Properties of the Euler Totient Function Modulo 24 and Some of Its Cryptographic Implications -- An Observation on the Security of McEliece’s Public-Key Cryptosystem -- How to Break Okamoto’s Cryptosystem by Reducing Lattice Bases -- Cryptanalysis of F.E.A.L. -- Fast Correlation Attacks on Stream Ciphers -- Running-Key Ciphers -- A New Class of Nonlinear Functions for Running-key Generators -- Windmill Generators A generalization and an observation of how many there are -- Lock-in Effect in Cascades of Clock-Controlled Shift-Registers -- Proof of Massey’s Conjectured Algorithm -- Linear Recurring m-Arrays -- Cipher Theory and Threshold -- Substantial Number of Cryptographic Keys and Its Application to Encryption Designs -- A Measure of Semiequivocation -- Some New Classes of Geometric Threshold Schemes -- New Ciphers -- A Universal Algorithm for Homophonic Coding -- A New Probabilistic Encryption Scheme -- Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption -- Some Applications of Multiple Key Ciphers.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540502517
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages