Advances in Cryptology 1981 – 1997

Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conferences 1981 – 1997

  • Kevin S. McCurley
  • Claus Dieter Ziegler

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1440)

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Conference Contents

    1. Front Matter
      Pages 1-1
    2. Allen Gersho
      Pages 3-8
    3. Thomas Beth
      Pages 9-12
    4. David Chaum, Ronald L. Rivest, Alan T. Sherman
      Pages 13-19
    5. Pages 21-21
    6. David Chaum
      Pages 23-27
    7. Thomas Beth, Norbert Cot, Ingemar Ingemarsson
      Pages 29-34
    8. G. R. Blakley, David Chaum
      Pages 35-40
    9. Franz Pichler
      Pages 41-47
    10. Hugh C. Williams
      Pages 49-54
    11. Ingemar Ingemarsson
      Pages 55-60
    12. A. M. Odlyzko
      Pages 61-67
    13. David Chaum, Wyn L. Price
      Pages 69-73
    14. Carl Pomerance
      Pages 75-80
    15. Christoph G. Günther
      Pages 81-86
    16. S. Goldwasser
      Pages 87-92
    17. J. -J. Quisquater, J. Vandewalle
      Pages 93-99
    18. G. Brassard
      Pages 101-109
    19. I. B. Damgård
      Pages 111-117

About this book

Introduction

AboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was brought by the industrial revolution of the last century. From the beginning of time, information has been an important asset for humans. In the early days of humanexistence,themereknowledgeofwheretomosteasilygatherfoodwas the di?erence between life and death. Throughout history, information has provided the means for winning wars, making fortunes, and shaping history. The underlying theme of the information revolution is that we continue to ?nd new ways to use information. These new uses for information serve to highlight our need to protect di?erent aspects of information. Cryptology may be broadly de?ned as the scienti?c study of adversarial information protection. Cryptology has traditionally dealt with the co- dentiality of information, but innovation in using information produces new requirements for protection of that information. Some are longstanding and fundamental - how do we guarantee that information is ”authentic”? How do we guarantee that information is timely? How can we produce bits that have the same properties as ”money”? Each of these questions has been grappled with in the cryptologic research community.

Keywords

Cryptanalysis Crypto Systems Cryptography DES Information Security Privacy cryptology

Editors and affiliations

  • Kevin S. McCurley
    • 1
  • Claus Dieter Ziegler
    • 2
  1. 1.IBM Almaden Research CenterSan JoseUSA
  2. 2.Abteilung Mathematik und InformatikFachinformationszentrum KarlsruheBerlinGermany

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-49677-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 1999
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-65069-0
  • Online ISBN 978-3-540-49677-9
  • Series Print ISSN 0302-9743
  • About this book
Industry Sectors
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace