Advances in Cryptology — AUSCRYPT '90

International Conference on Cryptology Sydney, Australia, January 8–11, 1990 Proceedings

Editors:

ISBN: 978-3-540-53000-8 (Print) 978-3-540-46297-2 (Online)

Table of contents (39 chapters)

previous Page of 2
  1. No Access

    Book Chapter

    Pages 1-13

    The implementation of elliptic curve cryptosystems

  2. No Access

    Book Chapter

    Pages 14-21

    Direct demonstration of the power to break public-key cryptosystems

  3. No Access

    Book Chapter

    Pages 23-31

    Continued fractions and the Berlekamp-Massey algorithm

  4. No Access

    Book Chapter

    Pages 32-36

    Nonlinear generators of binary sequences with controllable complexity and double key

  5. No Access

    Book Chapter

    Pages 37-38

    K-M sequence is forwardly predictable

  6. No Access

    Book Chapter

    Pages 39-43

    Lower bounds on the weight complexities of cascaded binary sequences

  7. No Access

    Book Chapter

    Pages 45-57

    Secure user access control for public networks

  8. No Access

    Book Chapter

    Pages 58-73

    Formal specification and verification of secure communication protocols

  9. No Access

    Book Chapter

    Pages 74-95

    Network security policy models

  10. No Access

    Book Chapter

    Pages 96-103

    KEYMEX: An expert system for the design of key management schemes

  11. No Access

    Book Chapter

    Pages 105-121

    On the formal analysis of PKCS authentication protocols

  12. No Access

    Book Chapter

    Pages 122-139

    Some remarks on authentication systems

  13. No Access

    Book Chapter

    Pages 140-154

    Meet-in-the-middle attack on digital signature schemes

  14. No Access

    Book Chapter

    Pages 155-164

    A binary sequence generator based on Ziv-Lempel source coding

  15. No Access

    Book Chapter

    Pages 165-175

    A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence

  16. No Access

    Book Chapter

    Pages 176-193

    Parallel generation of pseudo-random sequences

  17. No Access

    Book Chapter

    Pages 194-205

    Large primes in stream cipher cryptography

  18. No Access

    Book Chapter

    Pages 207-220

    Comparison of block ciphers

  19. No Access

    Book Chapter

    Pages 221-228

    Key scheduling in des type cryptosystems

  20. No Access

    Book Chapter

    Pages 229-236

    LOKI — A cryptographic primitive for authentication and secrecy applications

previous Page of 2