Advances in Cryptology — CRYPTO ’85 Proceedings

  • Hugh C. Williams
Conference proceedings CRYPTO 1985

DOI: 10.1007/3-540-39799-X

Part of the Lecture Notes in Computer Science book series (LNCS, volume 218)

Table of contents (44 papers)

  1. Front Matter
    Pages I-X
  2. Signatures and authentication

    1. Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields
      Dennis Estes, Leonard M. Adleman, Kireeti Kompella, Kevin S. McCurley, Gary L. Miller
      Pages 3-13
    2. Another Birthday Attack
      Don Coppersmith
      Pages 14-17
    3. Attacks on Some RSA Signatures
      Wiebren de Jonge, David Chaum
      Pages 18-27
    4. An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi
      Ernest F. Brickell, John M. DeLaurentis
      Pages 28-32
    5. A Secure Subliminal Channel (?)
      Gustavus J. Simmons
      Pages 33-41
  3. Protocols

    1. A Framework for the Study of Cryptographic Protocols
      Richard Berger, Sampath Kannan, René Peralta
      Pages 87-103
    2. Cheating at Mental Poker
      Don Coppersmith
      Pages 104-107
    3. Symmetric Public-Key Encryption
      Zvi Galil, Stuart Haber, Moti Yung
      Pages 128-137
  4. Copy Protection

    1. Software Protection: Myth or Reality?
      James R. Gosler
      Pages 140-157
    2. Public Protection of Software
      Amir Herzberg, Shlomit S. Pinter
      Pages 158-179
    3. Fingerprinting Long Forgiving Messages
      G. R. Blakley, C. Meadows, G. B. Purdy
      Pages 180-189
  5. Single Key Cryptology

    1. Cryptanalysis of des with a Reduced Number of Rounds
      David Chaum, Jan-Hendrik Evertse
      Pages 192-211
    2. Is DES a Pure Cipher? (Results of More Cycling Experiments on DES) (Preliminary Abstract)
      Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman
      Pages 212-226
    3. A Layered Approach to the Design of Private Key Cryptosystems
      T. E. Moore, S. E. Tavares
      Pages 227-245
    4. Lifetimes of Keys in Cryptographic Key Management Systems
      E. Okamoto, K. Nakamura
      Pages 246-259

About these proceedings


Computer automata calculus computer science cryptography cryptology information theory

Editors and affiliations

  • Hugh C. Williams
    • 1
  1. 1.Department of Computer ScienceUniversity of ManitobaWinnipegCanada

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1986
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-16463-0
  • Online ISBN 978-3-540-39799-1
  • Series Print ISSN 0302-9743