Research Catalog
Advances in cryptology : CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993 : proceedings
- Title
- Advances in cryptology : CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993 : proceedings / Douglas R. Stinson, ed.
- Author
- CRYPTO (Conference) (13th : 1993 : University of California, Santa Barbara)
- Publication
- Berlin ; New York : Springer-Verlag, ©1994.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Use in library | QA76.9.A25 C79 1993 | Off-site |
Details
- Additional Authors
- Stinson, Douglas R. (Douglas R.), 1956-
- Description
- x, 491 pages : illustrations; 24 cm.
- Summary
- "This volume contains the papers presented at the CRYPTO '93 conference. The conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom) and held in cooperation with the IEEE Computer Society. These proceedings contain revised versions of the 38 contributed talks, as well as two talks from the rump session. The papers are grouped into parts on: cryptosystems, stream ciphers and cryptographic functions, proof systems and zero-knowledge, secret sharing, number theory and algorithms, differential cryptanalysis, complexity theory, applications, authentication codes, hash functions, cryptanalysis, and key distribution."--PUBLISHER'S WEBSITE
- Series Statement
- Lecture notes in computer science ; 773
- Uniform Title
- Lecture notes in computer science ; 773.
- Alternative Title
- CRYPTO '93
- Subject
- Genre/Form
- Conference papers and proceedings
- Bibliography (note)
- Includes bibliographical references and index.
- Additional Formats (note)
- Also available in an electronic version.
- Contents
- Title pages -- Preface -- Contents -- (Cryptosystems Chair: Scott Vanstone) -- Efficient signature schemes based on birational permutations / Adi Shamir -- A new identification scheme based on syndrome decoding / Jacques Stern -- The shrinking generator / Don Coppersmith, Hugo Krawczyk, and Yishay Mansour -- (Stream Ciphers and Cryptographic Functions Chair: Rainer Rueppel) -- An integrity check value algorithm for stream ciphers / Richard Taylor -- Nonlinearly balanced Boolean functions and their propagation characteristics / Jennifer Seberry, Xian-Mo Zhang, and Yuliang Zheng -- (Proof Systems and Zero-Knowledge Chair: Joan Feigenbaum) -- A low communication competitive interactive proof system for promised quadratic residuosity / Toshiya Itoh, Masafumi Hoshi, and Shigeo Tsujii -- Secret sharing and perfect zero-knowledge / Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano -- One message proof systems with known space Verifiers / Yonatan Aumann and Uriel Feige -- Interactive hashing can simplify zero-knowledge protocol design without computational assumptions / Ivan Bjerre Damg⁰ard -- (Secret Sharing Chair: Mihir Bellare) -- Fully dynamic secret sharing schemes / Carlo Blundo, Antonella Cresti, Alfredo De Santis, and Ugo Vaccaro -- Multisecret threshold schemes / Wen-Ai Jackson, Keith M. Martin, and Christine M. O'Keefe -- Secret sharing made short / Hugo Krawczyk -- (Number Theory and Algorithms Chair: Andrew Odlyzko) -- A subexponential algorithm for discrete logarithms over all finite fields / Leonard M. Adleman and Johnathan DeMarrais -- An implementation of the general number field sieve / Johannes A. Buchmann, J. Loho, and J. Zayer -- On the factorization of RSA-120 / T. Denny, Bruce Dodson, Arjen K. Lenstra, and Mark S. Manasse -- Comparison of three modular reduction functions / Antoon Bosselaers, René Govaerts, and Joos Vandewalle -- (Differential Cryptanalysis Chair: Spyros Magliveras) -- Differential cryptanalysis of Lucifer / Ishai Ben-Aroya and Eli Biham -- Differential attack on message authentication codes / Kazuo Ohta and Mitsuru Matsui -- Cryptanalysis of the CFB mode of the DES with a reduced number of rounds / Bart Preneel, Marnix Nuttin, Vincent Rijmen, and Johan Buelens -- Weak keys for IDEA / Joan Daemen, René Govaerts, and Joos Vandewalle -- (Complexity Theory Chair: Joe Kilian) -- Entity authentication and key distribution / Mihir Bellare and Phillip Rogaway -- On the existence of statistically hiding bit commitment schemes and fail-stop signatures / Ivan Bjerre Damg⁰ard, Torben Pryds Pedersen, and Birgit Pfitzmann -- Joint encryption and message-efficient secure computation / Matthew Franklin and Stuart Haber -- Cryptographic primitives based on hard learning problems / Avrim Blum, Merrick Furst, Michael Kearns, and Richard J. Lipton -- (Applications Chair: Birgit Pfitzmann) -- Extensions of single-term coins / Niels Ferguson -- Untraceable off-line cash in wallets with observers / Stefan Brands -- Discreet solitary games / Claude Crépeau and Joe Kilian -- (Authentication Codes Chair: Doug Stinson) -- On families of hash functions via geometric codes and concatenation / Jürgen Bierbrauer, Thomas Johansson, Gregory A. Kabatianskii, and Bernard J.M. Smeets -- On the construction of perfect authentication codes that permit arbitration / Thomas Johansson -- Codes for interactive authentication / Peter Gemmell and Moni Naor -- (Hash Functions Chair: Ivan Damḡrd) -- Hash functions based on block ciphers: a synthetic approach / Bart Preneel, René Govaerts, and Joos Vandewalle -- Security of iterated hash functions based on block ciphers / Walter Hohl, Xuejia Lai, Thomas Meier, and Christian Waldvogel -- (Cryptanalysis Chair: Eli Biham) -- Improved algorithms for the permuted kernel problem / Jacques Patarin and Pascal Chauvaud -- On the distribution of characteristics in composite permutations / Luke O'Connor -- Remark on the threshold RSA signature scheme / Chuan-Ming Li, Tzonelih Hwang, and Narn-Yih Lee -- Another method for attaining security against adaptively chosen ciphertext attacks / Chae Hoon Lim and Pil Joong Lee -- Attacks on the birational permutation signature schemes / Don Coppersmith, Jacques Stern, and Serge Vaudenay -- (Key Distribution Chair: Tatsuaki Okamoto) -- Interaction in key distribution schemes / Amos Beimel and Benny Chor -- Secret-key agreement without public-key cryptography / Tom Leighton and Silvio Micali -- Broadcast encryption / Amos Fiat and Moni Naor -- Author index.
- ISBN
- 3540577661
- 9783540577669
- 0387577661
- 9780387577661
- LCCN
- 94000069
- OCLC
- ocm29670234
- 29670234
- SCSB-2011107
- Owning Institutions
- Princeton University Library