Advertisement

Advances in Cryptology — EUROCRYPT’ 87

Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, The Netherlands, April 13–15, 1987 Proceedings

  • David Chaum
  • Wyn L. Price

Part of the Lecture Notes in Computer Science book series (LNCS, volume 304)

Table of contents

  1. Front Matter
    Pages I-VII
  2. Sequences And Linear Complexity

  3. Hardware Topics

  4. Public Key Topics

    1. F. Jorissen, J. Vandewalle, R. Govaerts
      Pages 109-115
    2. Ernest F. Brickell, Yacov Yacobi
      Pages 117-125
    3. David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf
      Pages 127-141
    4. George I. Davida, Gilbert G. Walter
      Pages 143-147
  5. Authentication and Secure Transactions

  6. Hash Functions and Signatures

  7. Symmetric Ciphers: Theory

    1. James L. Massey, Ueli Maurer, Muzhong Wang
      Pages 237-247
    2. Jan-Hendrik Evertse
      Pages 249-266
    3. Akihiro Shimizu, Shoji Miyaguchi
      Pages 267-278
  8. Symmetric Ciphers: Application

    1. Ingrid Verbauwhede, Frank Hoornaert, Joos Vandewalle, Hugo De Man
      Pages 287-300
    2. David P. Anderson, P. Venkat Rangan
      Pages 301-309
  9. Back Matter
    Pages 311-314

About these proceedings

Keywords

authentication cryptography cryptology data security hash function privacy

Editors and affiliations

  • David Chaum
    • 1
  • Wyn L. Price
    • 2
  1. 1.Centre for Mathematics and Computer Science (CWI)AmsterdamThe Netherlands
  2. 2.National Physical LaboratoryTeddington, MiddlesexUK

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-39118-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 1988
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-19102-5
  • Online ISBN 978-3-540-39118-0
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace