Warehouse Stock Clearance Sale

Grab a bargain today!


Advances in Cryptology
By

Rating

Product Description
Product Details

Promotional Information

Springer Book Archives

Table of Contents

General Theory, Classical Methods.- Cryptology and Complexity Theories.- On Cryptosystems Based on Polynomials and Finite Fields.- Algebraical Structures of Cryptographic Transformations.- Non Linear Non Commutative Functions for Data Integrity.- Wire-Tap Channel II.- Equivocations for Homophonic Ciphers.- Propagation Characteristics of the DES.- Linear Ciphers and Random Sequence Generators with Multiple Clocks.- The Stop-and-Go-Generator.- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers.- On the linear complexity of cascaded sequences.- Public-Key Systems.- RSA-bits are 0.5 + ? secure.- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract).- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme.- A New Trapdoor Knapsack Public Key Cryptosystem.- RSA Chips (Past/Present/Future) (Extended abstract).- Number Theoretical Papers.- The Quadratic Sieve Factoring Algorithm.- Status Report on Factoring (At the Sandia National Laboratories).- Strong Primes are Easy to Find.- Discrete logarithms in finite fields and their cryptographic significance.- Channels, Networks, Key Distribution, Protocols.- User Functions for the Generation and Distribution of Encipherment Keys.- An Optimal Class of Symmetric Key Generation Systems.- On the Use of the Binary Multiplying Channel in a Private Communication System.- Secrecy and Privacy in a Local Area Network Environment.- The Subliminal Channel and Digital Signatures.- A Provably Secure Oblivious Transfer Protocol.- On Concurrent Identification Protocols (Extended Abstract).- Applications.- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System.- Security of Transportable ComputerizedFiles.- Encryption and Key Management for the ECS Statellite Service.- An Encryption and Authentification Procedure for Telesurveillance Systems.- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques.- Smart Cards.- Session on Smart Cards Tuesday April 10.- Smart Card Applications in Security and Data Protection.- Bull CP8 Smart Card Uses in Cryptology.- Estimation of some Encryption Functions Implemented into Smart Cards.- Smart Cards and Conditional Access.

Ask a Question About this Product More...
 
Look for similar items by category
People also searched for
Item ships from and is sold by Fishpond World Ltd.

Back to top