Skip to main content

Vintage Bit Cryptography

(Transcript of Discussion)

  • Conference paper
Security Protocols (Security Protocols 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5087))

Included in the following conference series:

  • 584 Accesses

Abstract

This may be a highly controversial talk, because this is an area where things are periodically rediscovered. But in the process of reinventing it, I think we’ve found a few interesting protocol issues, and a few interesting technological issues, which make it worth revisiting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shafarenko, A. (2009). Vintage Bit Cryptography. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2006. Lecture Notes in Computer Science, vol 5087. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04904-0_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04904-0_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04903-3

  • Online ISBN: 978-3-642-04904-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics