Skip to main content
  • Conference proceedings
  • © 1990

Advances in Cryptology - CRYPTO '89

Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 435)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (60 papers)

  1. Front Matter

    Pages I-XIII
  2. Why is cryptography harder than it looks?

    1. UNIX Password Security - Ten Years Later

      • David C. Feldmeier, Philip R. Karn
      Pages 44-63
  3. Pseudo-randomness and Sequences

    1. On the Quadratic Spans of Periodic Sequences

      • Agnes Hui Chan, Richard A. Games
      Pages 82-89
    2. The Shortest Feedback Shift Register That Can Generate A Given Sequence

      • Cees J. A. Jansen, Dick E. Boekee
      Pages 90-99
    3. Perfect Local Randomness in Pseudo-random Sequences

      • Ueli M. Maurer, James L. Massey
      Pages 100-112
    4. Sparse Pseudorandom Distributions

      • Oded Goldreich, Hugo Krawczyk
      Pages 113-127
    5. Bit Commitment Using Pseudo-Randomness

      • Moni Naor
      Pages 128-136
  4. Cryptanalysis and Implementation

    1. How to Predict Congruential Generators

      • Hugo Krawczyk
      Pages 138-153
    2. A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang

      • Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle
      Pages 154-163
    3. On the Linear Consistency Test (LCT) in Cryptanalysis with Applications

      • Kencheng Zeng, C. H. Yang, T. R. N. Rao
      Pages 164-174
    4. Batch RSA

      • Amos Fiat
      Pages 175-185
    5. On the Implementation of Elliptic Curve Cryptosystems

      • Andreas Bender, Guy Castagnoli
      Pages 186-192
  5. Signature and Authentication I

About this book

CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. This volume presents the proceedings of the ninth CRYPTO meeting. The papers are organized into sections with the following themes: Why is cryptography harder than it looks?, pseudo-randomness and sequences, cryptanalysis and implementation, signature and authentication, threshold schemes and key management, key distribution and network security, fast computation, odds and ends, zero-knowledge and oblivious transfer, multiparty computation.

Editors and Affiliations

  • Département IRO, Université de Montréal, Montréal, Canada

    Gilles Brassard

Bibliographic Information

  • Book Title: Advances in Cryptology - CRYPTO '89

  • Book Subtitle: Proceedings

  • Editors: Gilles Brassard

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/0-387-34805-0

  • Publisher: Springer New York, NY

  • eBook Packages: Springer Book Archive

  • Copyright Information: Springer-Verlag New York 1990

  • Softcover ISBN: 978-0-387-97317-3Published: 18 June 1990

  • eBook ISBN: 978-0-387-34805-6Published: 01 January 1995

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIII, 634

  • Topics: Cryptology

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access