Advances in Cryptology — EUROCRYPT’ 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, The Netherlands, April 13–15, 1987 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book contains the proceedings of the EUROCRYPT '87 conference, a workshop on theory and applications of cryptographic techniques held at Amsterdam, April 1987. 26 papers were selected from over twice that number submitted to the program committee. The authors come from Europe, North America, and Japan and represent some of the leading research groups working in the fields of cryptography and data security. The subjects covered include sequences and linear complexity; hardware considerations, including random sources, physical security, and cryptographic algorithm implementation; topics in public key cryptography; authentication and secure transactions; hash functions and signatures; and the theory and application of symmetric ciphers.

Author(s): James L. Massey (auth.), David Chaum, Wyn L. Price (eds.)
Series: Lecture Notes in Computer Science 304
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1988

Language: English
Pages: 316
Tags: Data Encryption

In Memoriam Tore Herlestam (1929–1986)....Pages 3-4
Alternating Step Generators Controlled by De Bruijn Sequences....Pages 5-14
Generation of Binary Sequences with Controllable Complexity and Ideal r -Tupel Distribution....Pages 15-23
Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators....Pages 25-35
Sequences with Almost Perfect Linear Complexity Profile....Pages 37-51
When Shift Registers Clock Themselves....Pages 53-64
Finite State Machine Modelling of Cryptographic Systems in Loops....Pages 65-73
Random Sources for Cryptographic Systems....Pages 77-81
Physical Protection of Cryptographic Devices....Pages 83-93
The RSA Cryptography Processor....Pages 95-105
Extension of Brickell’S Algorithm for Breaking High Density Knapsacks....Pages 109-115
On Privacy Homomorphisms (Extended Abstract)....Pages 117-125
An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations....Pages 127-141
A Public Key Analog Gyptosystem....Pages 143-147
Message Authentication with Arbitration of Transmitter/Receiver Disputes....Pages 151-165
Perfect and Essentially Perfect Authentication Schemes....Pages 167-170
Message Authentication and Dynamic Passwords....Pages 171-175
IC-Cards in High-Security Applications....Pages 177-199
Collision Free Hash Functions and Public Key Signature Schemes....Pages 203-216
Hash-Functions Using Modulo-N Operations....Pages 217-226
Blinding for Unanticipated Signatures....Pages 227-233
Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers....Pages 237-247
Linear Structures in Blockciphers....Pages 249-266
Fast Data Encipherment Algorithm FEAL....Pages 267-278
Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping....Pages 281-286
Security Considerations in the Design and Implementation of a new DES chip....Pages 287-300
High-Performance Interface Architectures for Cryptographic Hardware....Pages 301-309