Skip to main content
  • Conference proceedings
  • © 1990

Advances in Cryptology - AUSCRYPT '90

International Conference on Cryptology Sydney, Australia, January 8-11, 1990

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 453)

Conference series link(s): AUSCRYPT: International Conference on Cryptology

Conference proceedings info: AUSCRYPT 1990.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (39 papers)

  1. Front Matter

  2. The implementation of elliptic curve cryptosystems

    • Alfred Menezes, Scott Vanstone
    Pages 1-13
  3. Continued fractions and the Berlekamp-Massey algorithm

    • Zongduo Dai, Kencheng Zeng
    Pages 23-31
  4. K-M sequence is forwardly predictable

    • Yang Yi Xian
    Pages 37-38
  5. Network security policy models

    • Vijay Varadharajan
    Pages 74-95
  6. KEYMEX: An expert system for the design of key management schemes

    • J. C. A. van der Lubbe, D. E. Boekee
    Pages 96-103
  7. On the formal analysis of PKCS authentication protocols

    • Klaus Gaarder, Einar Snekkenes
    Pages 105-121
  8. Some remarks on authentication systems

    • Martin H. G. Anthony, Keith M. Martin, Jennifer Seberry, Peter Wild
    Pages 122-139
  9. Meet-in-the-middle attack on digital signature schemes

    • Kazuo Ohta, Kenji Koyama
    Pages 140-154
  10. A binary sequence generator based on Ziv-Lempel source coding

    • Cees J. A. Jansen, Dick E. Boekee
    Pages 155-164
  11. Parallel generation of pseudo-random sequences

    • Reihaneh Safavi-Naini
    Pages 176-193
  12. Large primes in stream cipher cryptography

    • Kencheng Zeng, C. H. Yang, T. R. N. Rao
    Pages 194-205
  13. Comparison of block ciphers

    • Helen Gustafson, Ed Dawson, Bill Caelli
    Pages 207-220
  14. Key scheduling in des type cryptosystems

    • Lawrence Brown, Jennifer Seberry
    Pages 221-228

About this book

This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology.

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access