Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000003658675 | QA76.9.A25 C64 1992 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.
Table of Contents
Contemporary Cryptology: A ForewordG. Simmons |
Contemporary Cryptology: An IntroductionJ. Massey |
Cryptography |
The Data Encryption Standard: Past and FutureM. Smid and D. Branstad |
Stream CiphersR. Rueppel |
The First Ten Years of Public Key CryptologyW. Diffie |
Public Key CryptographyJ. Nechvatal |
A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete LogarithmsP. van Oorschot |
Authentication |
Digital SignaturesC. Mitchell, et al. |
A Survey of Information AuthenticationG. Simmons |
Protocols |
Overview of Interactive Proof Systems and Zero-KnowledgeJ. Feigenbaum |
An Introduction to Shared Secret and/or Shared Control Schemes and Their ApplicationsG. Simmons) |
Cryptanalysis |
Cryptanalysis: A Survey of Recent ResultsE. Brickell and A. Odlyzko |
Protocol Failures in CryptosystemsJ. Moore |
Applications |
The Smart Card: A Standardized Security Device Dedicated to Public CryptologyL. Guillou, et al. |
How to Insure That Data Acquired to Verify Treaty Compliance are TrustworthyG. Simmons |
Index |
Editor's Biography |