Advances in Cryptology — CRYPTO ’85 Proceedings

  • Hugh C. Williams
Part of the Lecture Notes in Computer Science book series (LNCS, volume 218)

Table of contents

  1. Front Matter
    Pages I-X
  2. Signatures and authentication

    1. Dennis Estes, Leonard M. Adleman, Kireeti Kompella, Kevin S. McCurley, Gary L. Miller
      Pages 3-13
    2. Don Coppersmith
      Pages 14-17
    3. Wiebren de Jonge, David Chaum
      Pages 18-27
    4. Ernest F. Brickell, John M. DeLaurentis
      Pages 28-32
    5. Gustavus J. Simmons
      Pages 33-41
  3. Protocols

    1. Richard Berger, Sampath Kannan, René Peralta
      Pages 87-103
    2. Don Coppersmith
      Pages 104-107
    3. Zvi Galil, Stuart Haber, Moti Yung
      Pages 128-137
  4. Copy Protection

    1. James R. Gosler
      Pages 140-157
    2. Amir Herzberg, Shlomit S. Pinter
      Pages 158-179
    3. G. R. Blakley, C. Meadows, G. B. Purdy
      Pages 180-189
  5. Single Key Cryptology

    1. David Chaum, Jan-Hendrik Evertse
      Pages 192-211
    2. Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman
      Pages 212-226
    3. T. E. Moore, S. E. Tavares
      Pages 227-245
    4. E. Okamoto, K. Nakamura
      Pages 246-259

About these proceedings

Keywords

Computer automata calculus computer science cryptography cryptology information theory

Editors and affiliations

  • Hugh C. Williams
    • 1
  1. 1.Department of Computer ScienceUniversity of ManitobaWinnipegCanada

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-39799-X
  • Copyright Information Springer-Verlag Berlin Heidelberg 1986
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-16463-0
  • Online ISBN 978-3-540-39799-1
  • Series Print ISSN 0302-9743