Advertisement

Advances in Cryptology — CRYPTO’ 86

Proceedings

  • Andrew M. Odlyzko

Part of the Lecture Notes in Computer Science book series (LNCS, volume 263)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Data Encryption Standard

    1. E. F. Brickell, J. H. Moore, M. R. Purtill
      Pages 3-8
    2. Judy H. Moore, Gustavus J. Simmons
      Pages 9-32
  3. Public-Key Cryptography

  4. Cryptographic Protocols And Zero-Knowledge Proofs

  5. Secret-Sharing Methods

  6. Hardware Systems

    1. G. A. Orton, M. P. Roy, P. A. Scott, L. E. Peppard, S. E. Tavares
      Pages 277-301
    2. T. Beth, B. M. Cook, D. Gollmann
      Pages 302-310
  7. Software Systems

    1. Robert R. Jueneman
      Pages 327-346
    2. Ralph Gyoery, Jennifer Seberry
      Pages 347-377
  8. Software Protection, Probabilistic Methods, and Other Topics

    1. Silvio Micali, Charles Rackoff, Bob Sloan
      Pages 381-392
    2. Neal R. Wagner, Paul S. Putter, Marianne R. Cain
      Pages 393-404
    3. Agnes Hui Chan, Richard A. Games
      Pages 405-417
  9. Informal Contributions

    1. Pierre Beauchemin, Gilles Brassard, Claude Crépeau, Claude Goutier
      Pages 443-450
    2. Stephen M. Matyas
      Pages 451-458
    3. Louis C. Guillou, Michel Ugon
      Pages 464-479
    4. Gordon Rankine
      Pages 480-487
  10. Back Matter
    Pages 489-489

About these proceedings

Introduction

This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have all been held at the University of California at Santa Barbara. The first conference in this series, CRYPTO 81, organized by A. Gersho, did not have a formal proceedings. The proceedings of the following four conferences in this series have been published as: Advances in Cryptology: Proceedings of Crypto 82, D. Chaum, R. L. Rivest, and A. T. Sherman, eds., Plenum, 1983. Advances in Cryptology: Proceedings of Crypto 83, D. Chaum, ed., Plenum, 1984. Advances in Cryptology: Proceedings of CRYPTO 84, G. R. Blakley and D. Chaum, eds., Lecture Notes in Computer Science #196, Springer, 1985. Advances in Cryptology - CRYPTO '85 Proceedings, H. C. Williams, ed., Lecture Notes in Computer Science #218, Springer, 1986. A parallel series of conferences is held annually in Europe. The first of these had its proceedings published as Cryptography: Proceedings, Burg Feuerstein 1982, T. Beth, ed., Lecture Notes in Computer Science #149, Springer, 1983.

Keywords

DES S-Box Secret-Sharing authentication cryptographic protocol cryptography cryptology cryptosystems data encryption encryption privacy secret sharing

Editors and affiliations

  • Andrew M. Odlyzko
    • 1
  1. 1.AT&T Bell LaboratoriesMurray HillUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-47721-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 1987
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-18047-0
  • Online ISBN 978-3-540-47721-1
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site