Contemporary Cryptology: The Science of Information IntegrityGustavus J. Simmons The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers. |
Contents
CRYPTOGRAPHY | 41 |
Stream Ciphers 65 | 65 |
The First Ten Years of Public Key Cryptology | 135 |
Copyright | |
12 other sections not shown
Other editions - View all
Contemporary Cryptology: The Science of Information Integrity Gustavus J. Simmons No preview available - 1999 |
Common terms and phrases
able accepted Advances in Cryptology algorithm applications assumed attack authentication authority Berlin bits block called certificates chosen cipher ciphertext communication complexity Computer Science consider construction contains cryptography cryptosystem decryption defined described determine digital signature discussed distribution encryption example exists fact factoring field function given hash functions hence IEEE implementation initial integer knapsack known knows Lecture Notes linear method modulo Notes Notes in Computer obtain operation pair participants party pieces plaintext polynomial possible practical present prime probability problem Proc produce proof proposed protection protocol public key public key cryptosystem quadratic random receiver result satisfy scheme secrecy secret key sends sequence shared signature signed Springer-Verlag standard Theory tion transformation valid verify