Table of contents (27 papers)

  1. Front Matter
  2. Commercial Key Escrow: An Australian perspective
    William J. Caelli
    Pages 40-64
  3. Crypto in Europe — markets, law and policy
    Ross J. Anderson
    Pages 75-89
  4. A proposed architecture for trusted third party services
    Nigel Jefferies, Chris Mitchell, Michael Walker
    Pages 98-104
  5. A new key escrow cryptosystem
    Jingmin He, Ed Dawson
    Pages 105-114
  6. How to fairly reconstruct a shared secret
    Jingmin He, Ed Dawson
    Pages 115-124
  7. Randomness measures related to subset occurrence
    H. M. Gustafson, E. P. Dawson, J. Dj. Golić
    Pages 132-143
  8. Low order approximation of cipher functions
    William Millan
    Pages 144-155
  9. Multiple encryption with minimum key
    Ivan B. Damgård, Lars Ramkilde Knudsen
    Pages 156-164
  10. A cryptanalysis of clock-controlled shift registers with multiple steps
    Jovan Dj. Golić, Luke O'Connor
    Pages 174-185
  11. Discrete optimisation and fast correlation attacks
    Jovan Dj. Golić, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson
    Pages 186-200
  12. Keyed hash functions
    S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk
    Pages 201-214
  13. Cryptanalysis of the enhanced ElGamal's signature scheme
    Chi-Sung Laih, Wen-Chung Kuo
    Pages 228-231

About these proceedings


This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.
Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.


Authentication Techniques Authentikationstechniken Information Security Informationssicherheit Key Escrow Privatbereich Schlüsselhinterlegung algorithm algorithms cryptography cryptology linear optimization privacy

Bibliographic information

  • Copyright Information Springer-Verlag 1996
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-60759-5
  • Online ISBN 978-3-540-49363-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349