Table of contents (39 papers)

  1. Front Matter
  2. The implementation of elliptic curve cryptosystems
    Alfred Menezes, Scott Vanstone
    Pages 1-13
  3. Continued fractions and the Berlekamp-Massey algorithm
    Zongduo Dai, Kencheng Zeng
    Pages 23-31
  4. K-M sequence is forwardly predictable
    Yang Yi Xian
    Pages 37-38
  5. Network security policy models
    Vijay Varadharajan
    Pages 74-95
  6. KEYMEX: An expert system for the design of key management schemes
    J. C. A. van der Lubbe, D. E. Boekee
    Pages 96-103
  7. On the formal analysis of PKCS authentication protocols
    Klaus Gaarder, Einar Snekkenes
    Pages 105-121
  8. Some remarks on authentication systems
    Martin H. G. Anthony, Keith M. Martin, Jennifer Seberry, Peter Wild
    Pages 122-139
  9. Meet-in-the-middle attack on digital signature schemes
    Kazuo Ohta, Kenji Koyama
    Pages 140-154
  10. A binary sequence generator based on Ziv-Lempel source coding
    Cees J. A. Jansen, Dick E. Boekee
    Pages 155-164
  11. Parallel generation of pseudo-random sequences
    Reihaneh Safavi-Naini
    Pages 176-193
  12. Large primes in stream cipher cryptography
    Kencheng Zeng, C. H. Yang, T. R. N. Rao
    Pages 194-205
  13. Comparison of block ciphers
    Helen Gustafson, Ed Dawson, Bill Caelli
    Pages 207-220
  14. Key scheduling in des type cryptosystems
    Lawrence Brown, Jennifer Seberry
    Pages 221-228

About these proceedings

Introduction

This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology.

Keywords

Datenschutz Information Kodierung Kommunikation Kryptosysteme Protokolle STATISTICA Signatur algorithms coding theory complexity cryptography cryptology databases verification

Bibliographic information

  • Copyright Information Springer-Verlag 1990
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-53000-8
  • Online ISBN 978-3-540-46297-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349