Cryptography: Policy and Algorithms International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings

This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995. Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned...

Full description

Bibliographic Details
Other Authors: Dawson, Edward Pyle (Editor), Golic, Jovan (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 1996, 1996
Edition:1st ed. 1996
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
Table of Contents:
  • Open forum — Cryptography: Personal freedom and law enforcement is it possible to get agreement?
  • Privacy and security policy choices in an NII environment
  • Commercial Key Escrow: An Australian perspective
  • Encryption and the Global Information Infrastructure: An Australian perspective
  • Crypto in Europe — markets, law and policy
  • Saving dollars makes sense of crypto export controls
  • A proposed architecture for trusted third party services
  • A new key escrow cryptosystem
  • How to fairly reconstruct a shared secret
  • A note on nonuniform decimation of periodic sequences
  • Randomness measures related to subset occurrence
  • Low order approximation of cipher functions
  • Multiple encryption with minimum key
  • A one-key cryptosystem based on a finite nonlinear automaton
  • A cryptanalysis of clock-controlled shift registers with multiple steps
  • Discrete optimisation and fast correlation attacks
  • Keyed hash functions
  • Some active attacks on fast server-aided secret computation protocols for modular exponentiation
  • Cryptanalysis of the enhanced ElGamal's signature scheme
  • Access with pseudonyms
  • A new identification algorithm
  • Public-key cryptography on smart cards
  • Integrating smart cards into authentication systems
  • Smart-card with interferometric quantum cryptography device
  • Cryptographic APIs
  • Foiling active network impersonation attacks made in collusion with an insider
  • The CASS shell