Advances in Cryptology

Proceedings of CRYPTO 84

Editors:

ISBN: 978-3-540-15658-1 (Print) 978-3-540-39568-3 (Online)

Table of contents (40 chapters)

previous Page of 2
  1. Public Key Cryptosystems and Signatures

    1. Book Chapter

      Pages 3-9

      A Prototype Encryption System Using Public Key

    2. Book Chapter

      Pages 10-18

      A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms

    3. Book Chapter

      Pages 19-36

      A Public-Key Cryptosystem Based on the Word Problem

    4. Book Chapter

      Pages 37-46

      Efficient Signature Schemes Based on Polynomial Equations (preliminary version)

    5. Book Chapter

      Pages 47-53

      Identity-Based Cryptosystems and Signature Schemes

    6. Book Chapter

      Pages 54-65

      A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields (preliminary draft)

    7. Book Chapter

      Pages 66-70

      Some Public-Key Crypto-Functions as Intractable as Factorization

  2. Cryptosystems and Other Hard Problems

    1. Book Chapter

      Pages 73-82

      Computing Logarithms in GF (2n)

    2. Book Chapter

      Pages 83-94

      Wyner’s Analog Encryption Scheme: Results of a Simulation

    3. Book Chapter

      Pages 95-100

      On Rotation Group and Encryption of Analog Signals

    4. Book Chapter

      Pages 101-113

      The History of Book Ciphers

    5. Book Chapter

      Pages 114-114

      An Update on Factorization at Sandia National Laboratories

    6. Book Chapter

      Pages 115-143

      An LSI Digital Encryption Processor (DEP)

    7. Book Chapter

      Pages 144-146

      Efficient hardware and software implementations for the DES

    8. Book Chapter

      Pages 147-173

      Efficient hardware implementation of the DES

    9. Book Chapter

      Pages 174-190

      A Self-Synchronizing Cascaded Cipher System with Dynamic Control of Error Propagation

  3. Randomness and Its Concomitants

    1. Book Chapter

      Pages 193-202

      Efficient and Secure Pseudo-Random Number Generation (Extended Abstract)

    2. Book Chapter

      Pages 203-230

      An LSI Random Number Generator (RNG)

    3. Book Chapter

      Pages 231-241

      Generalized Linear Threshold Scheme

    4. Book Chapter

      Pages 242-268

      Security of Ramp Schemes

previous Page of 2