Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9948621451102882
    Format: XV, 331 p. , online resource.
    Edition: 1st ed. 1983.
    ISBN: 9781475706024
    Note: Algorithms and Theory -- Fast Computation of Discrete Logarithms in GF (q) -- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p) -- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem -- Infinite Structures in Information Theory -- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography -- Comparison of Two Pseudo-Random Number Generators -- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys -- Modes of Operation -- Some Regular Properties of the 'Data Encryption Standard' Algorithm -- The Average Cycle Size of the Key Stream in Output Feedback Encipherment -- Analysis of Certain Aspects of Output Feedback Mode -- Drainage and the DES Summary -- Security of a Keystream Cipher with Secret Initial Value -- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes -- Randomized Encryption Techniques -- Protocols and Transaction Security -- On the Security of Multi-Party Protocols in Distributed Systems -- On the Security of Ping-Pong Protocols -- The Use of Public-Key Cryptography for Signing Checks -- Blind Signatures for Untraceable Payments -- A Randomized Protocol for Signing Contracts -- On Signatures and Authentication -- Applications -- Cryptographic Protection of Personal Data Cards -- Non-Public Key Distribution -- Cryptographic Solution to a Multilevel Security Problem -- Local Network Cryptosystem Architecture: Access Control -- Implementing an Electronic Notary Public -- Quantum Cryptography, or Unforgeable Subway Tokens -- Special Session on Cryptanalysis -- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem -- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems -- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem -- Rump Session: Impromptu Talks by Conference Attendees -- Long Key Variants of DES -- On the Security of Multi-Party Ping-Pong Protocols -- Inferring a Sequence Generated by a Linear Congruence -- Key Reconstruction -- Nondeterministic Cryptography -- A Short Report on the RSA Chip.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9781475706048
    Additional Edition: Printed edition: ISBN 9781475706031
    Additional Edition: Printed edition: ISBN 9780306413667
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages