Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Advances in Cryptology – EUROCRYPT ’93

Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23–27, 1993 Proceedings

Tor Helleseth (Herausgeber)

Buch | Softcover
X, 465 Seiten
1994 | 1994
Springer Berlin (Verlag)
978-3-540-57600-6 (ISBN)

Lese- und Medienproben

Advances in Cryptology – EUROCRYPT ’93 -
CHF 74,85 inkl. MwSt
Eurocrypt is a series of open workshops on the theory andapplication of cryptographic techniques. These meetings havetaken place in Europe every year since 1982 and aresponsored by the International Association for CryptologicResearch.Eurocrypt '93 was held in the village of Lofthus in Norwayin May 1993. The call for papers resulted in 117 submissionswith authors representing 27 different countries. The 36accepted papers were selected by the program committee aftera blind refereeing process. The papers are grouped intoparts on authentication, public key, block ciphers, secretsharing, stream ciphers, digital signatures, protocols, hashfunctions, payment systems, and cryptanalysis. The volumeincludes 6 further rump session papers.

Authentication.- On the Relation Between A-Codes and Codes Correcting Independent Errors.- Optimal Authentication Systems.- Public Key.- Factoring Integers Using SIMD Sieves.- A New Elliptic Curve Based Analogue of RSA.- Weaknesses of a public-key cryptosystem based on factorizations of finite groups.- Block Ciphers.- Differentially uniform mappings for cryptography.- On Almost Perfect Nonlinear Permutations.- Two New Classes of Bent Functions.- Boolean functions satisfying a higher order strict avalanche criterion.- Secret Sharing.- Size of Shares and Probability of Cheating in Threshold Schemes.- Nonperfect Secret Sharing Schemes and Matroids.- Stream ciphers.- From the memoirs of a Norwegian cryptologist.- On the Linear Complexity of Products of Shift-Register Sequences.- Resynchronization Weaknesses in Synchronous Stream Ciphers.- Blind Synchronization of m-Sequences with Even Span.- On Constructions and Nonlinearity of Correlation Immune Functions.- Digital signatures.- Practical and Provably Secure Release of a Secret and Exchange of Signatures.- Subliminal Communication is Easy Using the DSA.- Can O.S.S. be Repaired? - Proposal for a New Practical Signature Scheme -.- Protocols I.- On a Limitation of BAN Logic.- Efficient Anonymous Channel and All/Nothing Election Scheme.- Untransferable Rights in a Client-Independent Server Environment.- Interactive Hashing Simplifies Zero-Knowledge Protocol Design.- Hash Functions.- One-Way Accumulators: A Decentralized Alternative to Digital Signatures.- The breaking of the AR Hash Function.- Collisions for the compression function of MD5.- How to Find and Avoid Collisions for the Knapsack Hash Function.- Payment Systems.- Single Term Off-Line Coins.- Improved Privacy in Wallets with Observers.- Distance-Bounding Protocols.- Cryptanalysis.- On the Distribution of Characteristics in Bijective Mappings.- On the Security of the IDEA Block Cipher.- Linear Cryptanalysis Method for DES Cipher.- New Types of Cryptanalytic Attacks Using Related Keys.- Protocols II.- Secret-Key Reconciliation by Public Discussion.- Global, Unpredictable Bit Generation Without Broadcast.- Rump Session.- On Schnorr's Preprocessing for Digital Signature Schemes.- Cryptanalysis of the Chang-Wu-Chen key distribution system.- An Alternate Explanation of two BAN-logic "failures".- The Consequences of Trust in Shared Secret Schemes.- Markov Ciphers and Alternating Groups.- On Key Distribution and Authentication in Mobile Radio Networks.

Erscheint lt. Verlag 28.1.1994
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo X, 465 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 720 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte authentication • coding theory • combinatorics • Cryptoanalysis • cryptographic functions • Cryptology • data encryption • Datenverschlüsselung • Encryption • hash function • Informationstheorie • Information Theory • Kodierungstheorie • Kryptographische Funktionen • Kryptologie • SEC
ISBN-10 3-540-57600-2 / 3540576002
ISBN-13 978-3-540-57600-6 / 9783540576006
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich