Research Catalog
Advances in cryptology, CRYPTO '94 : 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994 : proceedings
- Title
- Advances in cryptology, CRYPTO '94 : 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994 : proceedings / Yvo G. Desmedt (ed.).
- Author
- CRYPTO (Conference) (1994 : University of California, Santa Barbara)
- Publication
- Berlin ; New York : Springer-Verlag, ©1994.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Use in library | QA76.9.A25 C79 1994 | Off-site |
Details
- Additional Authors
- Description
- xii, 438 pages : illustrations; 24 cm
- Summary
- "This volume constitutes the proceedings of CRYPTO '94, the 14th International Cryptology Conference, held at Santa Barbara, CA, USA in August 1994 under the sponsorship of the International Association for Cryptologic Research (IACR). The proceedings contains revised versions of the 38 papers selected for presentation at the conference from a total of 114 submissions. All aspects of cryptologic research and advanced applications are addressed; in particular there are sections on block ciphers, signatures, implementation and hardware aspects, authentication and secret sharing, zero-knowledge, combinatorics, number theory, cryptanalysis and protocol failures, and secure computations and protocols."--PUBLISHER'S WEBSITE
- Series Statement
- Lecture notes in computer science ; 839
- Uniform Title
- Lecture notes in computer science ; 839.
- Alternative Title
- CRYPTO '94
- Subject
- Genre/Form
- Conference papers and proceedings
- Santa Barbara (Calif., 1994)
- Note
- "Sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy"--Preface
- Bibliography (note)
- Includes bibliographical references and index.
- Additional Formats (note)
- Also available in an electronic version.
- Contents
- The first experimental cryptanalysis of the Data Encryption Standard / Mitsuru Matsui -- Linear cryptanalysis of the Fast Data Encipherment Algorithm / Kazuo Ohta and Kazumaro Aoki -- Differential-linear cryptanalysis / Susan K. Langford and Martin E. Hellman -- Linear cryptanalysis using multiple approximations / Burton S. Kaliski, Jr. and M.J.B. Robshaw -- Hashing with SL[subscript 2] / Jean-Pierre Tillich and Gilles Zemor -- Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks / Jinhui Chao, Kazuo Tanada and Shigeo Tsujii -- Cryptographic protocols based on discrete logarithms in real-quadratic orders / Ingrid Biehl, Johannes Buchmann and Christoph Thiel -- Designated confirmer signatures and public-key encryption are equivalent / Tatsuaki Okamoto -- Directed acyclic graphs, one-way functions and digital signatures / Daniel Bleichenbacher and Ueli M. Maurer.
- An identity-based signature scheme with bounded life-span / Olivier Delos and Jean-Jacques Quisquater -- More flexible exponentiation with precomputation / Chae Hoon Lim and Pil Joong Lee -- A parallel permutation multiplier for a PGM crypto-chip / Tamas Horvath, Spyros S. Magliveras and Tran van Trung -- Cryptographic randomness from air turbulence in disk drives / Don Davis, Ross Ihaka and Philip Fenstermacher -- Cryptanalysis of the Gemmell and Naor multiround authentication protocol / Christian Gehrmann -- LFSR-based hashing and authentication / Hugo Krawczyk -- New bound on authentication code with arbitration / Kaoru Kurosawa -- Multi-secret sharing schemes / Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia and Ugo Vaccaro -- Designing identification schemes with keys of short size / Jacques Stern -- Proofs of partial knowledge and simplified design of witness hiding protocols / Ronald Cramer, Ivan Damgard and Berry Schoenmakers.
- Language dependent secure bit commitment / Toshiya Itoh, Yuji Ohta and Hiroki Shizuya -- On the length of cryptographic hash-values used in identification schemes / Marc Girault and Jacques Stern -- Incremental cryptography: the case of hashing and signing / Mihir Bellare, Oded Goldreich and Shafi Goldwasser -- An efficient existentially unforgeable signature scheme and its applications / Cynthia Dwork and Moni Naor -- Bounds for resilient functions and orthogonal arrays / Jurgen Bierbrauer, K. Gopalakrishnan and D.R. Stinson -- Tracing traitors / Benny Chor, Amos Fiat and Moni Naor -- Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms / Ueli M. Maurer -- Fast generation of provable primes using search in arithmetic progressions / Preda Mihailescu -- Attack on the cryptographic scheme NIKS-TAS / Don Coppersmith -- On the risk of opening distributed keys / Mike Burmester.
- Cryptanalysis of cryptosystems based on remote chaos replication / Th. Beth, D.E. Lazic and A. Mathias -- A Fourier transform approach to the linear complexity of nonlinearly filtered sequences / James L. Massey and Shirlei Sercouek -- The security of cipher block chaining / Mihir Bellare, Joe Kilian and Phillip Rogaway -- A chosen plaintext attack of the 16-round Khufu cryptosystem / Henri Gilbert and Pascal Chauvaud -- Ciphertext only attack for one-way function of the MAP using one ciphertext / Yukiyasu Tsunoo, Eiji Okamoto and Tomohiko Uyematsu -- Pitfalls in designing substitution boxes / Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng -- A randomness-rounds tradeoff in private computation / Eyal Kushilevitz and Adi Rosen -- Secure voting using partially compatible homomorphisms / Kazue Sako and Joe Kilian -- Maintaining security in the presence of transient faults / Ran Canetti and Amir Herzberg.
- ISBN
- 3540583335
- 9783540583332
- 0387583335
- 9780387583334
- OCLC
- ocm31179406
- 31179406
- SCSB-2028898
- Owning Institutions
- Princeton University Library