On some developments in cryptography and their applications to computer science

  • Hermann A. Maurer
Invited Lectures
Part of the Lecture Notes in Computer Science book series (LNCS, volume 74)


This paper presents a discussion and summary of results obtained jointly with K.Culik [1] and M.Nivat [2].

The idea of public key systems as applicable to information systems is reviewed. The development of information systems based on the new concept of encryption triple is outlined. Although the construction of encryption triples using number-theoretic tools is possible, systems of encryption triples obtained that way do not possess all properties desirable for designing information systems. As first step towards an alternative approach, regular bijections i.e. bijections definable by a-transducers are investigated, and a complete characterization of such bijections is given.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Culik II, K. and Maurer, H.A., Secure information storage and retrieval using new results in cryptography. Information Processing Letters (to appear), also: Report 16, IIG Graz (1978).Google Scholar
  2. 2.
    Maurer, H.A. and Nivat, M., Rational bijections of rational sets. Report 29, IIG Graz (1979).Google Scholar
  3. 3.
    Diffie, W. and Hellman, M., New directions in cryptography. IEEE Transactions on Information Theory (1976), 644–654.Google Scholar
  4. 4.
    Rivest, R., Shamir, A. and Adelman, L., A method for obtaining digital signatures and public-key cryptosystems. C.ACM 21 (1978), 120–126.CrossRefGoogle Scholar
  5. 5.
    Rivest, R., Private communication. (1978).Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1979

Authors and Affiliations

  • Hermann A. Maurer
    • 1
  1. 1.Institut für InformationsverarbeitungTechn.Univ.GrazGrazAustria

Personalised recommendations