Skip to main content
  • Conference proceedings
  • © 1996

Cryptography: Policy and Algorithms

International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1029)

Conference series link(s): CPA: International Conference on Cryptography: Policy and Algorithms

Conference proceedings info: CPA 1995.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Commercial Key Escrow: An Australian perspective

    • William J. Caelli
    Pages 40-64
  3. Crypto in Europe — markets, law and policy

    • Ross J. Anderson
    Pages 75-89
  4. A proposed architecture for trusted third party services

    • Nigel Jefferies, Chris Mitchell, Michael Walker
    Pages 98-104
  5. A new key escrow cryptosystem

    • Jingmin He, Ed Dawson
    Pages 105-114
  6. How to fairly reconstruct a shared secret

    • Jingmin He, Ed Dawson
    Pages 115-124
  7. Randomness measures related to subset occurrence

    • H. M. Gustafson, E. P. Dawson, J. Dj. Golić
    Pages 132-143
  8. Low order approximation of cipher functions

    • William Millan
    Pages 144-155
  9. Multiple encryption with minimum key

    • Ivan B. Damgård, Lars Ramkilde Knudsen
    Pages 156-164
  10. A cryptanalysis of clock-controlled shift registers with multiple steps

    • Jovan Dj. Golić, Luke O'Connor
    Pages 174-185
  11. Discrete optimisation and fast correlation attacks

    • Jovan Dj. Golić, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson
    Pages 186-200
  12. Keyed hash functions

    • S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk
    Pages 201-214
  13. Cryptanalysis of the enhanced ElGamal's signature scheme

    • Chi-Sung Laih, Wen-Chung Kuo
    Pages 228-231

Other Volumes

  1. Cryptography: Policy and Algorithms

About this book

This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.
Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access