Narrow your search

Library

KBR (1)

KU Leuven (1)

ULB (1)

ULiège (1)


Resource type

book (1)


Language

English (1)


Year
From To Submit

1991 (1)

Listing 1 - 1 of 1
Sort by
Advances in cryptology-Eurocrypt '90 : workshop on the theory and application of cryptographic techniques, Aarhus, Denmark, May 21-24, 1990 : proceedings
Author:
ISBN: 354053587X 038753587X 3540468773 Year: 1991 Volume: 473. Publisher: Berlin Heidelberg London Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the International Association for Cryptologic Research (IACR). Eurocrypt 90 took place in Åarhus, Denmark, in May 1990. From the 85 papers submitted, 42 were selected for presentation at the conference and for inclusion in this volume. In addition to the formal contributions, short abstracts of a number of informal talks are included in these proceedings. The proceedings are organized into sessions on protocols, number-theoretic algorithms, boolean functions, binary sequences, implementations, combinatorial schemes, cryptanalysis, new cryptosystems, signatures and authentication, and impromptu talks.

Keywords

Database management: security; integrity; protection--See also {?681.5*E5} --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Data encryption: data encryption standard; DES; public key cryptosystems --- Analysis of algorithms and problem complexity--See also {681.3*B6}; {681.3*B7}; {681.3*F13} --- 681.3*F2 Analysis of algorithms and problem complexity--See also {681.3*B6}; {681.3*B7}; {681.3*F13} --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- 681.3*H2 Database management: security; integrity; protection--See also {?681.5*E5} --- 681.3*H2 --- 681.3 *C2 --- 681.3*D46 --- 681.3*E3 --- 681.3*F2 --- Computers --- Cryptography --- Ordinateurs --- Cryptographie --- Access control --- Congresses --- Accès --- Contrôle --- Congrès --- Computer security --- Data encryption (Computer science). --- Coding theory. --- Computer security. --- Database management. --- Combinatorics. --- Operating systems (Computers). --- Cryptology. --- Coding and Information Theory. --- Systems and Data Security. --- Database Management. --- Operating Systems. --- Computer operating systems --- Disk operating systems --- Systems software --- Combinatorics --- Algebra --- Mathematical analysis --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Operating systems --- Protection --- Security measures

Listing 1 - 1 of 1
Sort by