Contemporary Cryptology: The Science of Information IntegrityGustavus J. Simmons The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers. |
Contents
CRYPTOGRAPHY | 41 |
Stream Ciphers 65 | 65 |
The First Ten Years of Public Key Cryptology | 135 |
Copyright | |
12 other sections not shown
Other editions - View all
Contemporary Cryptology: The Science of Information Integrity Gustavus J. Simmons No preview available - 1999 |
Common terms and phrases
Advances in Cryptology algorithm applications attack authentication scheme Berlin bits certificates Chaum ciphertext communication Computer Science cryptanalyst Crypto cryptoalgorithm Data Encryption Data Encryption Standard decryption Diffie digital signature discrete logarithms electronic example exponentiation factoring G. J. Simmons hash functions Hellman hence IEEE Trans implementation input integer integer factorization keystream knapsack Lecture Notes LFSR linear complexity Merkle modulo Notes in Computer Odlyzko one-way function output pair participants pieces of information plaintext polynomial private pieces probabilistic probability problem Proc proof protocol public component public key cryptography public key cryptosystem public key systems quadratic residue quadratic sieve random receiver result Rivest Santa Barbara secrecy secret key Section sequence Shamir shared control scheme shared secret schemes signature scheme signed smart cards Springer-Verlag standard stream cipher theorem Theory tion transformation transmitter trapdoor trapdoor one-way function valid vector verify zero-knowledge