↓ Skip to main content

Advances in Cryptology — AUSCRYPT '92

Overview of attention for book
Cover of 'Advances in Cryptology — AUSCRYPT '92'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 47 Threshold cryptosystems
  3. Altmetric Badge
    Chapter 48 Authentication codes with perfect protection
  4. Altmetric Badge
    Chapter 49 Practical proven secure authentication with arbitration
  5. Altmetric Badge
    Chapter 50 Authentication codes under impersonation attack
  6. Altmetric Badge
    Chapter 51 Cumulative arrays and geometric secret sharing schemes
  7. Altmetric Badge
    Chapter 52 Nonperfect secret sharing schemes
  8. Altmetric Badge
    Chapter 53 A construction of practical secret sharing schemes using linear block codes
  9. Altmetric Badge
    Chapter 54 HAVAL — A one-way hashing algorithm with variable length of output (extended abstract)
  10. Altmetric Badge
    Chapter 55 On the power of memory in the design of collision resistant hash functions
  11. Altmetric Badge
    Chapter 56 A practical digital multisignature scheme based on discrete logarithms (extended abstract)
  12. Altmetric Badge
    Chapter 57 Group-oriented undeniable signature schemes without the assistance of a mutually trusted party
  13. Altmetric Badge
    Chapter 58 Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract)
  14. Altmetric Badge
    Chapter 59 Linear nonequivalence versus nonlinearity
  15. Altmetric Badge
    Chapter 60 Constructing large cryptographically strong S-boxes
  16. Altmetric Badge
    Chapter 61 Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept
  17. Altmetric Badge
    Chapter 62 Cryptanalysis of LOKI 91
  18. Altmetric Badge
    Chapter 63 Cryptanalysis of summation generator
  19. Altmetric Badge
    Chapter 64 Secure addition sequence and its applications on the server-aided secret computation protocols
  20. Altmetric Badge
    Chapter 65 Subliminal channels for signature transfer and their application to signature distribution schemes
  21. Altmetric Badge
    Chapter 66 A practical secret voting scheme for large scale elections
  22. Altmetric Badge
    Chapter 67 Privacy for multi-party protocols
  23. Altmetric Badge
    Chapter 68 New protocols for electronic money
  24. Altmetric Badge
    Chapter 69 Modelling and analyzing cryptographic protocols using Petri nets
  25. Altmetric Badge
    Chapter 70 On verifiable implicit asking protocols for RSA computation
  26. Altmetric Badge
    Chapter 71 Modified Maurer-Yacobi's scheme and its applications
  27. Altmetric Badge
    Chapter 72 The vulnerability of geometric sequences based on fields of odd characteristic
  28. Altmetric Badge
    Chapter 73 A fast cryptographic checksum algorithm based on stream ciphers
  29. Altmetric Badge
    Chapter 74 An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure
  30. Altmetric Badge
    Chapter 75 Construction of m -ary de Bruijn sequences (extended abstract)
  31. Altmetric Badge
    Chapter 76 Information technology security standards — An Australian perspective
  32. Altmetric Badge
    Chapter 77 Non-interactive generation of shared pseudorandom sequences
  33. Altmetric Badge
    Chapter 78 A generalized description of DES-based and Benes-based permutationgenerators
  34. Altmetric Badge
    Chapter 79 Prime generation with the Demytko-Miller-Trbovich algorithm
  35. Altmetric Badge
    Chapter 80 Constructions of feebly-one-way families of permutations
  36. Altmetric Badge
    Chapter 81 On bit correlations among preimages of “Many to one” One-way functions
  37. Altmetric Badge
    Chapter 82 The fast cascade exponentiation algorithm and its applications on cryptography
  38. Altmetric Badge
    Chapter 83 The design of a conference key distribution system
  39. Altmetric Badge
    Chapter 84 Remarks on “The design of a Conference Key Distribution System”
  40. Altmetric Badge
    Chapter 85 Public-key cryptosystem based on the discrete logarithm problem
  41. Altmetric Badge
    Chapter 86 Elliptic curves over F p suitable for cryptosystems
  42. Altmetric Badge
    Chapter 87 The probability Distribution of the Diffie-Hellman Key
  43. Altmetric Badge
    Chapter 88 A modular exponentiation unit based on systolic arrays
  44. Altmetric Badge
    Chapter 89 A comparison of key distribution patterns constructed from circle geometries
  45. Altmetric Badge
    Chapter 90 A block cipher method using combinations of different methods under the control of the user key
  46. Altmetric Badge
    Chapter 91 An attack on two hash functions by Zheng-Matsumoto-Imai
  47. Altmetric Badge
    Chapter 92 Primality testing with Lucas functions
Attention for Chapter 79: Prime generation with the Demytko-Miller-Trbovich algorithm
Altmetric Badge

Citations

dimensions_citation
16 Dimensions

Readers on

mendeley
30 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Prime generation with the Demytko-Miller-Trbovich algorithm
Chapter number 79
Book title
Advances in Cryptology — AUSCRYPT '92
Published by
Springer, Berlin, Heidelberg, December 1992
DOI 10.1007/3-540-57220-1_79
Book ISBNs
978-3-54-057220-6, 978-3-54-047976-5
Authors

Leisa Condie, Condie, Leisa

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 30 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 30 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 9 30%
Student > Master 7 23%
Professor 3 10%
Researcher 3 10%
Lecturer 2 7%
Other 4 13%
Unknown 2 7%
Readers by discipline Count As %
Computer Science 21 70%
Mathematics 3 10%
Physics and Astronomy 1 3%
Engineering 1 3%
Design 1 3%
Other 0 0%
Unknown 3 10%