Lecture Notes in Computer Science

Advances in Cryptology

Proceedings of CRYPTO '85

Editors: Williams, Hugh C. (Ed.)

46Chapter downloads/week on SpringerLink

Buy this book

eBook N/A
  • ISBN 978-3-540-39799-1
  • digitally watermarked, no DRM
  • included format: PDF
  • eBooks can be used on all Reading Devices
Softcover N/A
  • ISBN 978-3-540-16463-0
  • free shipping for individuals worldwide
About this book

In the summer of 1981 Allen Gersho organized the first major open co,ifcrcncc c~ci devoted to cryptologic research This meeting, Crypto '81, was held at the Universitc nl California campus in Santa Barbara Since then the Crypto' conference has become dii annual event These are the proceedings of the fifth1 of these confercnces, Crypt0 XS Each section of this volume corresponds to a session at the meeting. Thr paperk were accepted by the program committee, sometimes on the basis of an abstract only. and appear here without having been otherwise refereed. The last section contains papers lor some of the impromptu talks given at the traditional rump session. Each of thew pq1ci-k was refereed by a single member of the program committee. An author index ;is wcll ;I\ 'I keyword index, the entries for which were mainly supplied by the authors. appear at 11ic end of the volume. Unfortunately, two of the papers accepted for presentation at Crypto '85 could noi be included in this book they are: Unique Extrapolation of Polynomial Recurrences J. C. Lagarias and J. A. Reeds (A. T. & T Bell Labs) Some Cryptographic Applications of Permutation I'olynomials and Permutation Functions Rupert Nobarer (Universitat fur Bildungswissenschaftttn, Austria) It is my great pleasure to acknowledge the efforts of all of those who contributed to making these proceedings possible: the authors, program committee, other orgmizrrs ot the meeting, IACR officers and directors. and aU the attendees.

Table of contents (7 chapter)

  • Cryptanalysis of des with a Reduced Number of Rounds

    David Chaum, Jan-Hendrik Evertse

    Pages 192-211

    Buy Chapter price n/a
  • Analysis of a Public Key Approach Based on Polynomial Substitution

    Harriet Fell, Whitfield Diffie

    Pages 340-349

    Buy Chapter price n/a
  • Trapdoor Rings And Their Use In Cryptography

    V. Varadharajan

    Pages 369-395

    Buy Chapter price n/a
  • Use of Elliptic Curves in Cryptography

    Victor S. Miller

    Pages 417-426

    Buy Chapter price n/a
  • Cryptography with Cellular Automata

    Stephen Wolfram

    Pages 429-432

    Buy Chapter price n/a
Free Preview

Buy this book

eBook N/A
  • ISBN 978-3-540-39799-1
  • digitally watermarked, no DRM
  • included format: PDF
  • eBooks can be used on all Reading Devices
Softcover N/A
  • ISBN 978-3-540-16463-0
  • free shipping for individuals worldwide

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Advances in Cryptology
Book Subtitle
Proceedings of CRYPTO '85
Series Title
Lecture Notes in Computer Science
Series Volume
218
Copyright
1986
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-39799-1
DOI
10.1007/3-540-39799-X
Softcover ISBN
978-3-540-16463-0
Series ISSN
0302-9743
Edition Number
1
Topics