This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology.
Author(s): Alfred Menezes, Scott Vanstone (auth.), Jennifer Seberry, Josef Pieprzyk (eds.)
Series: Lecture Notes in Computer Science 453
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1990
Language: English
Pages: 462
City: Berlin; New York
Tags: Data Encryption;Coding and Information Theory;Computer Communication Networks;Number Theory;Combinatorics;Communications Engineering, Networks
The implementation of elliptic curve cryptosystems....Pages 1-13
Direct demonstration of the power to break public-key cryptosystems....Pages 14-21
Continued fractions and the Berlekamp-Massey algorithm....Pages 23-31
Nonlinear generators of binary sequences with controllable complexity and double key....Pages 32-36
K-M sequence is forwardly predictable....Pages 37-38
Lower bounds on the weight complexities of cascaded binary sequences....Pages 39-43
Secure user access control for public networks....Pages 45-57
Formal specification and verification of secure communication protocols....Pages 58-73
Network security policy models....Pages 74-95
KEYMEX: An expert system for the design of key management schemes....Pages 96-103
On the formal analysis of PKCS authentication protocols....Pages 105-121
Some remarks on authentication systems....Pages 122-139
Meet-in-the-middle attack on digital signature schemes....Pages 140-154
A binary sequence generator based on Ziv-Lempel source coding....Pages 155-164
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence....Pages 165-175
Parallel generation of pseudo-random sequences....Pages 176-193
Large primes in stream cipher cryptography....Pages 194-205
Comparison of block ciphers....Pages 207-220
Key scheduling in des type cryptosystems....Pages 221-228
LOKI — A cryptographic primitive for authentication and secrecy applications....Pages 229-236
Permutation generators of alternating groups....Pages 237-244
Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms....Pages 245-264
A (non-practical) three-pass identification protocol using coding theory....Pages 265-272
Demonstrating possession without revealing factors and its application....Pages 273-293
Anonymous one-time signatures and flexible untraceable electronic cash....Pages 294-305
Dyadic matrices and their potential significance in cryptography (abstract)....Pages 307-310
A note on strong Fibonacci pseudoprimes....Pages 311-317
On the significance of the directed acyclic word graph in cryptology....Pages 318-326
Solving equations in sequences....Pages 327-332
The practical application of state of the art security in real environments....Pages 333-355
RSA as a benchmark for multiprocessor machines....Pages 356-359
Range equations and range matrices: a study in statistical database security....Pages 360-385
Record encryption in distributed databases....Pages 386-395
VLSI design for exponentiation in GF (2 n )....Pages 397-405
A fast modular-multiplication module for smart cards....Pages 406-409
Minòs: Extended user authentication....Pages 410-423
Universal logic sequences....Pages 425-432
The three faces of information security....Pages 433-450
Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system....Pages 451-462