


default search action
AUSCRYPT 1990: Sydney, Australia
- Jennifer Seberry, Josef Pieprzyk:
Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings. Lecture Notes in Computer Science 453, Springer 1990, ISBN 3-540-53000-2
Public-Key Cryptosystems
- Alfred Menezes, Scott A. Vanstone:
The Implementation of Elliptic Curve Cryptosystems. 2-13 - Kenji Koyama:
Direct Demonstration of the Power to Break Public-Key Cryptosystems. 14-21
Pseudoranomness And Sequences
- Zong-Duo Dai, Kencheng Zeng:
Continued Fractions and the Berlekamp-Massey Algorithm. 24-31 - Guang Gong:
Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key. 32-36 - Yixian Yang:
K-M Sequence is Forwardly Predictable. 37-38 - Cunsheng Ding:
Lower Bounds on the Weight Complexities of Cascaded Binary Sequences. 39-43
Network Security
- Pil Joong Lee:
Secure User Access Control for Public Networks. 46-57 - Svein J. Knapskog:
Formal Specification and Verification of Secure Communication Protocols. 58-73 - Vijay Varadharajan:
Network Security Policy Models. 74-95 - Jan C. A. van der Lubbe, Dick E. Boekee:
KEYMEX: An expert system for the design of key management schemes. 96-103
Authentication
- Klaus Gaarder, Einar Snekkenes:
On The Formal Analysis of PKCS Authentication Protocols. 106-121 - Martin Anthony
, Keith M. Martin, Jennifer Seberry, Peter R. Wild:
Some Remarks on Authentication Systems. 122-139 - Kazuo Ohta, Kenji Koyama:
Meet-in-the-Middle Attack on Digital Signature Schemes. 140-154
Pseudorandomness And Sequences II
- Cees J. A. Jansen, Dick E. Boekee:
A Binary Sequence Generator Based on Ziv-Lempel Source Coding. 156-164 - Miodrag J. Mihaljevic, Jovan Dj. Golic:
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. 165-175 - Reihaneh Safavi-Naini:
Parallel Generation of Pseudo-Random Sequences. 176-193 - Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao:
Large Primes in Stream Cipher Cryptography. 194-205
Block Ciphers
- Helen Gustafson, Ed Dawson, William J. Caelli:
Comparison of Block Ciphers. 208-220 - Lawrence Brown, Jennifer Seberry:
Key Scheduling In Des Type Cryptosystems. 221-228 - Lawrence Brown, Josef Pieprzyk
, Jennifer Seberry:
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. 229-236 - Josef Pieprzyk
, Xian-Mo Zhang:
Permutation Generators of Alternating Groups. 237-244
Zero-Knowledge Protocols
- David Chaum:
Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms. 246-264 - Marc Girault:
A (non-practical) three-pass identification protocol using coding theory. 265-272 - Hiroki Shizuya, Kenji Koyama, Toshiya Itoh:
Demonstrating Possession without Revealing Factors and its Application. 273-293 - Barry Hayes:
Anonymous One-Time Signatures and Flexible Untraceable Electronic Cash. 294-305
Theory
- Yixian Yang:
Dyadic Matrices and Their Potential Significance in Cryptography. 308-310 - Rudolf Lidl, Winfried B. Müller:
A Note on Strong Fibonacci Pseudoprimes. 311-317 - Cees J. A. Jansen, Dick E. Boekee:
On the Significance of the Directed Acyclic Word Graph in Cryptology. 318-326 - Kencheng Zeng, Minqiang Huang:
Solving Equations in Sequences. 327-332
Applications
- Ronald Ferreira:
The Practical Application Of State Of The Art Security In Real Environments. 334-355 - Rodney H. Cooper, Wayne Patterson:
RSA as a Benchmark for Multiprocessor Machines. 356-359 - Vangalur S. Alagar:
Range Equations and Range Matrices: a Study in Statistical Database Security. 360-385 - Thomas Hardjono:
Record Encryption in Distributed Databases. 386-395
Implementations
- Willi Geiselmann, Dieter Gollmann:
VLSI Design for Exponentiation in GF (2n). 398-405 - Hikaru Morita:
A Fast Modular-multiplication Module for Smart Cards. 406-409 - Michael Newberry:
Minòs: Extended User Authentication. 410-423
Rump Session
- Ed Dawson, Bruce Goldburg:
Universal Logic Sequences. 426-432 - John M. Carroll:
The Three Faces of Information Security. 433-450 - Mark Ames:
Secure Cryptographic Initialisation. 451-462

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.