Author: Carl Pomerance
Publisher: Springer
ISBN: 3540481842
Category : Computers
Languages : en
Pages : 458
Book Description
Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably secure protocols. Goldwasser, Micali, and Rackoff originally suggested this technique for controlling the knowledge released in an interactive proof of membership in a language, and for classification of languages [19]. In this approach, knowledge is defined in terms of complexity to convey knowledge if it gives a computational advantage to the receiver, theory, and a message is said for example by giving him the result of an intractable computation. The formal model of interacting machines is described in [19, 15, 171. A proof-system (for a language L) is an interactive protocol by which one user, the prover, attempts to convince another user, the verifier, that a given input x is in L. We assume that the verifier is a probabilistic machine which is limited to expected polynomial-time computation, while the prover is an unlimited probabilistic machine. (In cryptographic applications the prover has some trapdoor information, or knows the cleartext of a publicly known ciphertext) A correct proof-system must have the following properties: If XE L, the prover will convince the verifier to accept the pmf with very high probability. If XP L no prover, no matter what program it follows, is able to convince the verifier to accept the proof, except with vanishingly small probability.
Advances in Cryptology - CRYPTO '87
Author: Carl Pomerance
Publisher: Springer
ISBN: 3540481842
Category : Computers
Languages : en
Pages : 458
Book Description
Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably secure protocols. Goldwasser, Micali, and Rackoff originally suggested this technique for controlling the knowledge released in an interactive proof of membership in a language, and for classification of languages [19]. In this approach, knowledge is defined in terms of complexity to convey knowledge if it gives a computational advantage to the receiver, theory, and a message is said for example by giving him the result of an intractable computation. The formal model of interacting machines is described in [19, 15, 171. A proof-system (for a language L) is an interactive protocol by which one user, the prover, attempts to convince another user, the verifier, that a given input x is in L. We assume that the verifier is a probabilistic machine which is limited to expected polynomial-time computation, while the prover is an unlimited probabilistic machine. (In cryptographic applications the prover has some trapdoor information, or knows the cleartext of a publicly known ciphertext) A correct proof-system must have the following properties: If XE L, the prover will convince the verifier to accept the pmf with very high probability. If XP L no prover, no matter what program it follows, is able to convince the verifier to accept the proof, except with vanishingly small probability.
Publisher: Springer
ISBN: 3540481842
Category : Computers
Languages : en
Pages : 458
Book Description
Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably secure protocols. Goldwasser, Micali, and Rackoff originally suggested this technique for controlling the knowledge released in an interactive proof of membership in a language, and for classification of languages [19]. In this approach, knowledge is defined in terms of complexity to convey knowledge if it gives a computational advantage to the receiver, theory, and a message is said for example by giving him the result of an intractable computation. The formal model of interacting machines is described in [19, 15, 171. A proof-system (for a language L) is an interactive protocol by which one user, the prover, attempts to convince another user, the verifier, that a given input x is in L. We assume that the verifier is a probabilistic machine which is limited to expected polynomial-time computation, while the prover is an unlimited probabilistic machine. (In cryptographic applications the prover has some trapdoor information, or knows the cleartext of a publicly known ciphertext) A correct proof-system must have the following properties: If XE L, the prover will convince the verifier to accept the pmf with very high probability. If XP L no prover, no matter what program it follows, is able to convince the verifier to accept the proof, except with vanishingly small probability.
Advances in Cryptology - CRYPTO '88
Author: Shafi Goldwasser
Publisher: Springer
ISBN: 0387347992
Category : Computers
Languages : en
Pages : 589
Book Description
The papers in this volume were presented at the CRYPTO '88 conference on theory and applications of cryptography, held in Santa Barbara, California, August 21-25, 1988. The papers were chosen for their perceived originality and often represent preliminary reports on continuing research. The main sections deal with the following topics: Zero-Knowledge, Number Theory, Pseudorandomness, Signatures, Complexity, Protocols, Security, Cryptoanalysis. As such, they will give the committed reader a unique insight into the very latest developments in the field.
Publisher: Springer
ISBN: 0387347992
Category : Computers
Languages : en
Pages : 589
Book Description
The papers in this volume were presented at the CRYPTO '88 conference on theory and applications of cryptography, held in Santa Barbara, California, August 21-25, 1988. The papers were chosen for their perceived originality and often represent preliminary reports on continuing research. The main sections deal with the following topics: Zero-Knowledge, Number Theory, Pseudorandomness, Signatures, Complexity, Protocols, Security, Cryptoanalysis. As such, they will give the committed reader a unique insight into the very latest developments in the field.
Advances in Cryptology – CRYPTO 2018
Author: Hovav Shacham
Publisher: Springer
ISBN: 3319968785
Category : Computers
Languages : en
Pages : 788
Book Description
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
Publisher: Springer
ISBN: 3319968785
Category : Computers
Languages : en
Pages : 788
Book Description
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
Advances in Cryptology – EUROCRYPT '90
Author: Ivan B. Damgard
Publisher: Springer
ISBN: 3540468773
Category : Computers
Languages : en
Pages : 509
Book Description
Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the International Association for Cryptologic Research (IACR). Eurocrypt 90 took place in Åarhus, Denmark, in May 1990. From the 85 papers submitted, 42 were selected for presentation at the conference and for inclusion in this volume. In addition to the formal contributions, short abstracts of a number of informal talks are included in these proceedings. The proceedings are organized into sessions on protocols, number-theoretic algorithms, boolean functions, binary sequences, implementations, combinatorial schemes, cryptanalysis, new cryptosystems, signatures and authentication, and impromptu talks.
Publisher: Springer
ISBN: 3540468773
Category : Computers
Languages : en
Pages : 509
Book Description
Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the International Association for Cryptologic Research (IACR). Eurocrypt 90 took place in Åarhus, Denmark, in May 1990. From the 85 papers submitted, 42 were selected for presentation at the conference and for inclusion in this volume. In addition to the formal contributions, short abstracts of a number of informal talks are included in these proceedings. The proceedings are organized into sessions on protocols, number-theoretic algorithms, boolean functions, binary sequences, implementations, combinatorial schemes, cryptanalysis, new cryptosystems, signatures and authentication, and impromptu talks.
CSL '87
Author: Egon Börger
Publisher: Springer Science & Business Media
ISBN: 9783540502418
Category : Computers
Languages : en
Pages : 356
Book Description
This volume contains the papers which were presented to the workshop "Computer-Science Logic" held in Karlsruhe on October 12-16, 1987. Traditionally Logic, or more specifically, Mathematical Logic splits into several subareas: Set Theory, Proof Theory, Recursion Theory, and Model Theory. In addition there is what sometimes is called Philosophical Logic which deals with topics like nonclassical logics and which for historical reasons has been developed mainly at philosphical departments rather than at mathematics institutions. Today Computer Science challenges Logic in a new way. The theoretical analysis of problems in Computer Science for intrinsic reasons has pointed back to Logic. A broad class of questions became visible which is of a basically logical nature. These questions are often related to some of the traditional disciplines of Logic but normally without being covered adequately by any of them. The novel and unifying aspect of this new branch of Logic is the algorithmic point of view which is based on experiences people had with computers. The aim of the "Computer-Science Logic" workshop and of this volume is to represent the richness of research activities in this field in the German-speaking countries and to point to their underlying general logical principles.
Publisher: Springer Science & Business Media
ISBN: 9783540502418
Category : Computers
Languages : en
Pages : 356
Book Description
This volume contains the papers which were presented to the workshop "Computer-Science Logic" held in Karlsruhe on October 12-16, 1987. Traditionally Logic, or more specifically, Mathematical Logic splits into several subareas: Set Theory, Proof Theory, Recursion Theory, and Model Theory. In addition there is what sometimes is called Philosophical Logic which deals with topics like nonclassical logics and which for historical reasons has been developed mainly at philosphical departments rather than at mathematics institutions. Today Computer Science challenges Logic in a new way. The theoretical analysis of problems in Computer Science for intrinsic reasons has pointed back to Logic. A broad class of questions became visible which is of a basically logical nature. These questions are often related to some of the traditional disciplines of Logic but normally without being covered adequately by any of them. The novel and unifying aspect of this new branch of Logic is the algorithmic point of view which is based on experiences people had with computers. The aim of the "Computer-Science Logic" workshop and of this volume is to represent the richness of research activities in this field in the German-speaking countries and to point to their underlying general logical principles.
Advances in Cryptology - Crypto '88
Author: Shafi Goldwasser
Publisher:
ISBN: 9781475789171
Category :
Languages : en
Pages : 612
Book Description
Publisher:
ISBN: 9781475789171
Category :
Languages : en
Pages : 612
Book Description
Advances in Cryptology -- CRYPTO 2011
Author: Phillip Rogaway
Publisher: Springer Science & Business Media
ISBN: 3642227910
Category : Cryptography
Languages : en
Pages : 796
Book Description
Publisher: Springer Science & Business Media
ISBN: 3642227910
Category : Cryptography
Languages : en
Pages : 796
Book Description
EUROCAL '87
Author: James H. Davenport
Publisher: Springer Science & Business Media
ISBN: 9783540515173
Category : Computers
Languages : en
Pages : 516
Book Description
This is the sixth in a series of conference proceedings of international conferences on computer algebra held in Europe. All the preceding ones have also been published as Lecture Notes in Computer Science. They contain original research material not published elsewhere, and a few invited lectures summarising the state of the art. Computer algebra is the science of using computers to do algebraic calculations, rather than the purely arithmetic calculations which we all know computers can do. These calculations may be polynomial-like calculations - one thread of the conference was devoted to polynomial algorithms - or may relate to other areas of mathematics such as integration, the solution of differential equations, or geometry - a second thread was devoted to those topics. The calculations can be applied in a wide range of scientific and engineering subjects, and in branches of mathematics. Physics has benefitted especially from these calculations, and the proceedings contain many papers on this, and also papers on applications in computer aided design and robotics, to name but a few other applications. The third thread of the proceedings was devoted to these applications and to the computer algebra systems which perform these calculations.
Publisher: Springer Science & Business Media
ISBN: 9783540515173
Category : Computers
Languages : en
Pages : 516
Book Description
This is the sixth in a series of conference proceedings of international conferences on computer algebra held in Europe. All the preceding ones have also been published as Lecture Notes in Computer Science. They contain original research material not published elsewhere, and a few invited lectures summarising the state of the art. Computer algebra is the science of using computers to do algebraic calculations, rather than the purely arithmetic calculations which we all know computers can do. These calculations may be polynomial-like calculations - one thread of the conference was devoted to polynomial algorithms - or may relate to other areas of mathematics such as integration, the solution of differential equations, or geometry - a second thread was devoted to those topics. The calculations can be applied in a wide range of scientific and engineering subjects, and in branches of mathematics. Physics has benefitted especially from these calculations, and the proceedings contain many papers on this, and also papers on applications in computer aided design and robotics, to name but a few other applications. The third thread of the proceedings was devoted to these applications and to the computer algebra systems which perform these calculations.
MFDBS 87
Author: Joachim Biskup
Publisher: Springer Science & Business Media
ISBN: 9783540191216
Category : Computers
Languages : en
Pages : 260
Book Description
This volume contains the 13 best of the 18 papers presented at the first MFDBS conference held in Dresden, GDR, January 19-23, 1987. A short summary of the two panel discussions is also included. The volume is intended to be a reflection of the current state of knowledge and a guide to further development in database theory. The main topics covered are: theoretical fundaments of the relational data model (dependency theory, design theory, null values, query processing, complexity theory), and of its extensions (graphical representations, NF2-models), conceptual modelling of distributed database management systems and the relationship between logic and databases.
Publisher: Springer Science & Business Media
ISBN: 9783540191216
Category : Computers
Languages : en
Pages : 260
Book Description
This volume contains the 13 best of the 18 papers presented at the first MFDBS conference held in Dresden, GDR, January 19-23, 1987. A short summary of the two panel discussions is also included. The volume is intended to be a reflection of the current state of knowledge and a guide to further development in database theory. The main topics covered are: theoretical fundaments of the relational data model (dependency theory, design theory, null values, query processing, complexity theory), and of its extensions (graphical representations, NF2-models), conceptual modelling of distributed database management systems and the relationship between logic and databases.
Selected Areas in Cryptography
Author: Kaisa Nyberg
Publisher: Springer
ISBN: 3540364927
Category : Computers
Languages : en
Pages : 416
Book Description
This book constitutes the thoroughly refereed post-proceedings of the 9th Annual International Workshop on Selected Areas in Cryptology, SAC 2002, held in St. John's, Newfoundland, Canada, in August 2002. The 25 revised full papers presented were carefully selected from 90 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic curve enhancements, SNOW, encryption schemes, differential attacks, Boolean functions and stream ciphers, block cipher security, signatures and secret sharing, MAC and hash constructions, and RSA and XTR enhancements.
Publisher: Springer
ISBN: 3540364927
Category : Computers
Languages : en
Pages : 416
Book Description
This book constitutes the thoroughly refereed post-proceedings of the 9th Annual International Workshop on Selected Areas in Cryptology, SAC 2002, held in St. John's, Newfoundland, Canada, in August 2002. The 25 revised full papers presented were carefully selected from 90 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic curve enhancements, SNOW, encryption schemes, differential attacks, Boolean functions and stream ciphers, block cipher security, signatures and secret sharing, MAC and hash constructions, and RSA and XTR enhancements.