Research Catalog

Advances in cryptology : CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993 : proceedings

Title
Advances in cryptology : CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993 : proceedings / Douglas R. Stinson, ed.
Author
CRYPTO (Conference) (13th : 1993 : University of California, Santa Barbara)
Publication
Berlin ; New York : Springer-Verlag, ©1994.

Items in the Library & Off-site

Filter by

1 Item

StatusFormatAccessCall NumberItem Location
TextUse in library QA76.9.A25 C79 1993Off-site

Details

Additional Authors
Stinson, Douglas R. (Douglas R.), 1956-
Description
x, 491 pages : illustrations; 24 cm.
Summary
"This volume contains the papers presented at the CRYPTO '93 conference. The conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom) and held in cooperation with the IEEE Computer Society. These proceedings contain revised versions of the 38 contributed talks, as well as two talks from the rump session. The papers are grouped into parts on: cryptosystems, stream ciphers and cryptographic functions, proof systems and zero-knowledge, secret sharing, number theory and algorithms, differential cryptanalysis, complexity theory, applications, authentication codes, hash functions, cryptanalysis, and key distribution."--PUBLISHER'S WEBSITE
Series Statement
Lecture notes in computer science ; 773
Uniform Title
Lecture notes in computer science ; 773.
Alternative Title
CRYPTO '93
Subject
  • Computers > Access control > Congresses
  • Cryptography > Congresses
  • Computers > access control
  • Computers > Access control
  • Cryptography
  • Computabilidade E Modelos De Computacao
  • Cryptographie > Congrès
  • Ordinateurs > Accès > Contrôle > Congrès
Genre/Form
Conference papers and proceedings
Bibliography (note)
  • Includes bibliographical references and index.
Additional Formats (note)
  • Also available in an electronic version.
Contents
Title pages -- Preface -- Contents -- (Cryptosystems Chair: Scott Vanstone) -- Efficient signature schemes based on birational permutations / Adi Shamir -- A new identification scheme based on syndrome decoding / Jacques Stern -- The shrinking generator / Don Coppersmith, Hugo Krawczyk, and Yishay Mansour -- (Stream Ciphers and Cryptographic Functions Chair: Rainer Rueppel) -- An integrity check value algorithm for stream ciphers / Richard Taylor -- Nonlinearly balanced Boolean functions and their propagation characteristics / Jennifer Seberry, Xian-Mo Zhang, and Yuliang Zheng -- (Proof Systems and Zero-Knowledge Chair: Joan Feigenbaum) -- A low communication competitive interactive proof system for promised quadratic residuosity / Toshiya Itoh, Masafumi Hoshi, and Shigeo Tsujii -- Secret sharing and perfect zero-knowledge / Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano -- One message proof systems with known space Verifiers / Yonatan Aumann and Uriel Feige -- Interactive hashing can simplify zero-knowledge protocol design without computational assumptions / Ivan Bjerre Damg⁰ard -- (Secret Sharing Chair: Mihir Bellare) -- Fully dynamic secret sharing schemes / Carlo Blundo, Antonella Cresti, Alfredo De Santis, and Ugo Vaccaro -- Multisecret threshold schemes / Wen-Ai Jackson, Keith M. Martin, and Christine M. O'Keefe -- Secret sharing made short / Hugo Krawczyk -- (Number Theory and Algorithms Chair: Andrew Odlyzko) -- A subexponential algorithm for discrete logarithms over all finite fields / Leonard M. Adleman and Johnathan DeMarrais -- An implementation of the general number field sieve / Johannes A. Buchmann, J. Loho, and J. Zayer -- On the factorization of RSA-120 / T. Denny, Bruce Dodson, Arjen K. Lenstra, and Mark S. Manasse -- Comparison of three modular reduction functions / Antoon Bosselaers, René Govaerts, and Joos Vandewalle -- (Differential Cryptanalysis Chair: Spyros Magliveras) -- Differential cryptanalysis of Lucifer / Ishai Ben-Aroya and Eli Biham -- Differential attack on message authentication codes / Kazuo Ohta and Mitsuru Matsui -- Cryptanalysis of the CFB mode of the DES with a reduced number of rounds / Bart Preneel, Marnix Nuttin, Vincent Rijmen, and Johan Buelens -- Weak keys for IDEA / Joan Daemen, René Govaerts, and Joos Vandewalle -- (Complexity Theory Chair: Joe Kilian) -- Entity authentication and key distribution / Mihir Bellare and Phillip Rogaway -- On the existence of statistically hiding bit commitment schemes and fail-stop signatures / Ivan Bjerre Damg⁰ard, Torben Pryds Pedersen, and Birgit Pfitzmann -- Joint encryption and message-efficient secure computation / Matthew Franklin and Stuart Haber -- Cryptographic primitives based on hard learning problems / Avrim Blum, Merrick Furst, Michael Kearns, and Richard J. Lipton -- (Applications Chair: Birgit Pfitzmann) -- Extensions of single-term coins / Niels Ferguson -- Untraceable off-line cash in wallets with observers / Stefan Brands -- Discreet solitary games / Claude Crépeau and Joe Kilian -- (Authentication Codes Chair: Doug Stinson) -- On families of hash functions via geometric codes and concatenation / Jürgen Bierbrauer, Thomas Johansson, Gregory A. Kabatianskii, and Bernard J.M. Smeets -- On the construction of perfect authentication codes that permit arbitration / Thomas Johansson -- Codes for interactive authentication / Peter Gemmell and Moni Naor -- (Hash Functions Chair: Ivan Damḡrd) -- Hash functions based on block ciphers: a synthetic approach / Bart Preneel, René Govaerts, and Joos Vandewalle -- Security of iterated hash functions based on block ciphers / Walter Hohl, Xuejia Lai, Thomas Meier, and Christian Waldvogel -- (Cryptanalysis Chair: Eli Biham) -- Improved algorithms for the permuted kernel problem / Jacques Patarin and Pascal Chauvaud -- On the distribution of characteristics in composite permutations / Luke O'Connor -- Remark on the threshold RSA signature scheme / Chuan-Ming Li, Tzonelih Hwang, and Narn-Yih Lee -- Another method for attaining security against adaptively chosen ciphertext attacks / Chae Hoon Lim and Pil Joong Lee -- Attacks on the birational permutation signature schemes / Don Coppersmith, Jacques Stern, and Serge Vaudenay -- (Key Distribution Chair: Tatsuaki Okamoto) -- Interaction in key distribution schemes / Amos Beimel and Benny Chor -- Secret-key agreement without public-key cryptography / Tom Leighton and Silvio Micali -- Broadcast encryption / Amos Fiat and Moni Naor -- Author index.
ISBN
  • 3540577661
  • 9783540577669
  • 0387577661
  • 9780387577661
LCCN
94000069
OCLC
  • ocm29670234
  • 29670234
  • SCSB-2011107
Owning Institutions
Princeton University Library