Advances in Cryptology — CRYPTO ’85 Proceedings

Editors:

ISBN: 978-3-540-16463-0 (Print) 978-3-540-39799-1 (Online)

Table of contents (44 chapters)

previous Page of 3
  1. Signatures and authentication

    1. Book Chapter

      Pages 3-13

      Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields

    2. Book Chapter

      Pages 14-17

      Another Birthday Attack

    3. Book Chapter

      Pages 18-27

      Attacks on Some RSA Signatures

    4. Book Chapter

      Pages 28-32

      An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi

    5. Book Chapter

      Pages 33-41

      A Secure Subliminal Channel (?)

    6. Book Chapter

      Pages 42-55

      Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences

  2. Protocols

    1. Book Chapter

      Pages 58-72

      On the Security of Ping-Pong Protocols when Implemented using the RSA (Extended Abstract)

    2. Book Chapter

      Pages 73-86

      A Secure Poker Protocol that Minimizes the Effect of Player Coalitions

    3. Book Chapter

      Pages 87-103

      A Framework for the Study of Cryptographic Protocols

    4. Book Chapter

      Pages 104-107

      Cheating at Mental Poker

    5. Book Chapter

      Pages 108-127

      Security for the DoD Transmission Control Protocol

    6. Book Chapter

      Pages 128-137

      Symmetric Public-Key Encryption

  3. Copy Protection

    1. Book Chapter

      Pages 140-157

      Software Protection: Myth or Reality?

    2. Book Chapter

      Pages 158-179

      Public Protection of Software

    3. Book Chapter

      Pages 180-189

      Fingerprinting Long Forgiving Messages

  4. Single Key Cryptology

    1. Book Chapter

      Pages 192-211

      Cryptanalysis of des with a Reduced Number of Rounds

    2. Book Chapter

      Pages 212-226

      Is DES a Pure Cipher? (Results of More Cycling Experiments on DES) (Preliminary Abstract)

    3. Book Chapter

      Pages 227-245

      A Layered Approach to the Design of Private Key Cryptosystems

    4. Book Chapter

      Pages 246-259

      Lifetimes of Keys in Cryptographic Key Management Systems

    5. Book Chapter

      Pages 260-272

      Correlation Immunity and the Summation Generator

previous Page of 3