1983

Advances in Cryptology

Proceedings of Crypto 82

Editors:

ISBN: 978-1-4757-0604-8 (Print) 978-1-4757-0602-4 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xv

  2. Algorithms and Theory

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-13

      Fast Computation of Discrete Logarithms in GF (q)

    3. No Access

      Book Chapter

      Pages 15-19

      Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p)

    4. No Access

      Book Chapter

      Pages 21-37

      A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem

    5. No Access

      Book Chapter

      Pages 39-50

      Infinite Structures in Information Theory

    6. No Access

      Book Chapter

      Pages 51-60

      A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography

    7. No Access

      Book Chapter

      Pages 61-78

      Comparison of Two Pseudo-Random Number Generators

    8. No Access

      Book Chapter

      Pages 79-86

      On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys

  3. Modes of Operation

    1. Front Matter

      Pages 87-87

    2. No Access

      Book Chapter

      Pages 89-96

      Some Regular Properties of the ‘Data Encryption Standard’ Algorithm

    3. No Access

      Book Chapter

      Pages 97-98

      The Average Cycle Size of the Key Stream in Output Feedback Encipherment

    4. No Access

      Book Chapter

      Pages 99-127

      Analysis of Certain Aspects of Output Feedback Mode

    5. No Access

      Book Chapter

      Pages 129-131

      Drainage and the DES Summary

    6. No Access

      Book Chapter

      Pages 133-137

      Security of a Keystream Cipher with Secret Initial Value

    7. No Access

      Book Chapter

      Pages 139-143

      Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes

    8. No Access

      Book Chapter

      Pages 145-163

      Randomized Encryption Techniques

  4. Protocols and Transaction Security

    1. Front Matter

      Pages 165-165

    2. No Access

      Book Chapter

      Pages 167-175

      On the Security of Multi-Party Protocols in Distributed Systems

    3. No Access

      Book Chapter

      Pages 177-186

      On the Security of Ping-Pong Protocols

    4. No Access

      Book Chapter

      Pages 187-197

      The Use of Public-Key Cryptography for Signing Checks

    5. No Access

      Book Chapter

      Pages 199-203

      Blind Signatures for Untraceable Payments

    6. No Access

      Book Chapter

      Pages 205-210

      A Randomized Protocol for Signing Contracts

    7. No Access

      Book Chapter

      Pages 211-215

      On Signatures and Authentication

previous Page of 2