1984

Advances in Cryptology

Proceedings of Crypto 83

Editors:

ISBN: 978-1-4684-4732-3 (Print) 978-1-4684-4730-9 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xii

  2. Algorithms and Theory

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-23

      Knapsack Public Key Cryptosystems and Diophantine Approximation

    3. No Access

      Book Chapter

      Pages 25-37

      Solving Low Density Knapsacks

    4. No Access

      Book Chapter

      Pages 39-42

      Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems

    5. No Access

      Book Chapter

      Pages 43-50

      On the Power of Cascade Ciphers

    6. No Access

      Book Chapter

      Pages 51-67

      The Prisoners’ Problem and the Subliminal Channel

  3. Modes of Operation

    1. Front Matter

      Pages 69-69

    2. No Access

      Book Chapter

      Pages 71-80

      An Overview of Factoring

    3. No Access

      Book Chapter

      Pages 81-85

      New Ideas for Factoring Large Integers

    4. No Access

      Book Chapter

      Pages 87-102

      Factoring Numbers on the Massively Parallel Computer

    5. No Access

      Book Chapter

      Pages 103-113

      Factorization Using the Quadratic Sieve Algorithm

  4. Protocols and Transaction Security

    1. Front Matter

      Pages 115-115

    2. No Access

      Book Chapter

      Pages 117-131

      Signatures Through Approximate Representations by Quadratic Forms

    3. No Access

      Book Chapter

      Pages 133-136

      A Simple Protocol for Signing Contracts

    4. No Access

      Book Chapter

      Pages 137-146

      Reducibility Among Protocols

    5. No Access

      Book Chapter

      Pages 147-151

      How to Exchange Half a Bit

    6. No Access

      Book Chapter

      Pages 153-153

      Blind Signature System

  5. Applications

    1. Front Matter

      Pages 155-155

    2. No Access

      Book Chapter

      Pages 157-170

      A Layered Broadcast Cryptographic System

    3. No Access

      Book Chapter

      Pages 171-202

      Analytical Characteristics of the DES

    4. No Access

      Book Chapter

      Pages 203-207

      Producing a One-Way Hash Function from DES

    5. No Access

      Book Chapter

      Pages 209-230

      On the Security of Compressed Encodings

    6. No Access

      Book Chapter

      Pages 231-247

      Field Encryption and Authentication

    7. No Access

      Book Chapter

      Pages 249-249

      Shift-Register Synthesis (Modulo m)

previous Page of 2