Amazon cover image
Image from Amazon.com

Advances in Cryptology 1981 - 1997 [electronic resource] : Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conference, 1981 - 1997 /

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 1440Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1998Edition: 1st ed. 1998Description: XIX, 464 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540496779
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.824 23
LOC classification:
  • QA268
Online resources:
Contents:
Conference Contents -- CRYPTO ’81 -- EUROCRYPT ’82 -- CRYPTO ’82 -- EUROCRYPT ’83 -- CRYPTO ’83 -- EUROCRYPT ’84 -- CRYPTO ’84 -- EUROCRYPT ’85 -- CRYPTO ’85 -- EUROCRYPT ’86 -- CRYPTO ’86 -- EUROCRYPT ’87 -- CRYPTO ’87 -- EUROCRYPT ’88 -- CRYPTO ’88 -- EUROCRYPT ’89 -- CRYPTO ’89 -- EUROCRYPT ’90 -- CRYPTO ’90 -- EUROCRYPT ’91 -- CRYPTO ’91 -- EUROCRYPT ’92 -- CRYPTO ’92 -- EUROCRYPT ’93 -- CRYPTO ’93 -- EUROCRYPT ’94 -- CRYPTO ’94 -- EUROCRYPT ’95 -- CRYPTO ’95 -- EUROCRYPT ’96 -- CRYPTO ’96 -- EUROCRYPT ’97 -- CRYPTO ’97.
In: Springer Nature eBookSummary: AboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was brought by the industrial revolution of the last century. From the beginning of time, information has been an important asset for humans. In the early days of humanexistence,themereknowledgeofwheretomosteasilygatherfoodwas the di?erence between life and death. Throughout history, information has provided the means for winning wars, making fortunes, and shaping history. The underlying theme of the information revolution is that we continue to ?nd new ways to use information. These new uses for information serve to highlight our need to protect di?erent aspects of information. Cryptology may be broadly de?ned as the scienti?c study of adversarial information protection. Cryptology has traditionally dealt with the co- dentiality of information, but innovation in using information produces new requirements for protection of that information. Some are longstanding and fundamental - how do we guarantee that information is ”authentic”? How do we guarantee that information is timely? How can we produce bits that have the same properties as ”money”? Each of these questions has been grappled with in the cryptologic research community.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Conference Contents -- CRYPTO ’81 -- EUROCRYPT ’82 -- CRYPTO ’82 -- EUROCRYPT ’83 -- CRYPTO ’83 -- EUROCRYPT ’84 -- CRYPTO ’84 -- EUROCRYPT ’85 -- CRYPTO ’85 -- EUROCRYPT ’86 -- CRYPTO ’86 -- EUROCRYPT ’87 -- CRYPTO ’87 -- EUROCRYPT ’88 -- CRYPTO ’88 -- EUROCRYPT ’89 -- CRYPTO ’89 -- EUROCRYPT ’90 -- CRYPTO ’90 -- EUROCRYPT ’91 -- CRYPTO ’91 -- EUROCRYPT ’92 -- CRYPTO ’92 -- EUROCRYPT ’93 -- CRYPTO ’93 -- EUROCRYPT ’94 -- CRYPTO ’94 -- EUROCRYPT ’95 -- CRYPTO ’95 -- EUROCRYPT ’96 -- CRYPTO ’96 -- EUROCRYPT ’97 -- CRYPTO ’97.

AboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was brought by the industrial revolution of the last century. From the beginning of time, information has been an important asset for humans. In the early days of humanexistence,themereknowledgeofwheretomosteasilygatherfoodwas the di?erence between life and death. Throughout history, information has provided the means for winning wars, making fortunes, and shaping history. The underlying theme of the information revolution is that we continue to ?nd new ways to use information. These new uses for information serve to highlight our need to protect di?erent aspects of information. Cryptology may be broadly de?ned as the scienti?c study of adversarial information protection. Cryptology has traditionally dealt with the co- dentiality of information, but innovation in using information produces new requirements for protection of that information. Some are longstanding and fundamental - how do we guarantee that information is ”authentic”? How do we guarantee that information is timely? How can we produce bits that have the same properties as ”money”? Each of these questions has been grappled with in the cryptologic research community.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in