Limit search to available items
Book Cover
Author CRYPTO (Conference) (1994 : University of California, Santa Barbara)

Title Advances in cryptology, CRYPTO '94 : 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994 : proceedings / Yvo G. Desmedt (ed.)
Published Berlin ; New York : Springer-Verlag, ©1994


Description 1 online resource (xii, 438 pages) : illustrations
Series Lecture notes in computer science ; 839
Lecture notes in computer science ; 839.
Contents The first experimental cryptanalysis of the Data Encryption Standard / Mitsuru Matsui -- Linear cryptanalysis of the Fast Data Encipherment Algorithm / Kazuo Ohta and Kazumaro Aoki -- Differential-linear cryptanalysis / Susan K. Langford and Martin E. Hellman -- Linear cryptanalysis using multiple approximations / Burton S. Kaliski, Jr. and M.J.B. Robshaw -- Hashing with SL[subscript 2] / Jean-Pierre Tillich and Gilles Zemor -- Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks / Jinhui Chao, Kazuo Tanada and Shigeo Tsujii -- Cryptographic protocols based on discrete logarithms in real-quadratic orders / Ingrid Biehl, Johannes Buchmann and Christoph Thiel -- Designated confirmer signatures and public-key encryption are equivalent / Tatsuaki Okamoto -- Directed acyclic graphs, one-way functions and digital signatures / Daniel Bleichenbacher and Ueli M. Maurer
An identity-based signature scheme with bounded life-span / Olivier Delos and Jean-Jacques Quisquater -- More flexible exponentiation with precomputation / Chae Hoon Lim and Pil Joong Lee -- A parallel permutation multiplier for a PGM crypto-chip / Tamas Horvath, Spyros S. Magliveras and Tran van Trung -- Cryptographic randomness from air turbulence in disk drives / Don Davis, Ross Ihaka and Philip Fenstermacher -- Cryptanalysis of the Gemmell and Naor multiround authentication protocol / Christian Gehrmann -- LFSR-based hashing and authentication / Hugo Krawczyk -- New bound on authentication code with arbitration / Kaoru Kurosawa -- Multi-secret sharing schemes / Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia and Ugo Vaccaro -- Designing identification schemes with keys of short size / Jacques Stern -- Proofs of partial knowledge and simplified design of witness hiding protocols / Ronald Cramer, Ivan Damgard and Berry Schoenmakers
Language dependent secure bit commitment / Toshiya Itoh, Yuji Ohta and Hiroki Shizuya -- On the length of cryptographic hash-values used in identification schemes / Marc Girault and Jacques Stern -- Incremental cryptography: the case of hashing and signing / Mihir Bellare, Oded Goldreich and Shafi Goldwasser -- An efficient existentially unforgeable signature scheme and its applications / Cynthia Dwork and Moni Naor -- Bounds for resilient functions and orthogonal arrays / Jurgen Bierbrauer, K. Gopalakrishnan and D.R. Stinson -- Tracing traitors / Benny Chor, Amos Fiat and Moni Naor -- Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms / Ueli M. Maurer -- Fast generation of provable primes using search in arithmetic progressions / Preda Mihailescu -- Attack on the cryptographic scheme NIKS-TAS / Don Coppersmith -- On the risk of opening distributed keys / Mike Burmester
Cryptanalysis of cryptosystems based on remote chaos replication / Th. Beth, D.E. Lazic and A. Mathias -- A Fourier transform approach to the linear complexity of nonlinearly filtered sequences / James L. Massey and Shirlei Sercouek -- The security of cipher block chaining / Mihir Bellare, Joe Kilian and Phillip Rogaway -- A chosen plaintext attack of the 16-round Khufu cryptosystem / Henri Gilbert and Pascal Chauvaud -- Ciphertext only attack for one-way function of the MAP using one ciphertext / Yukiyasu Tsunoo, Eiji Okamoto and Tomohiko Uyematsu -- Pitfalls in designing substitution boxes / Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng -- A randomness-rounds tradeoff in private computation / Eyal Kushilevitz and Adi Rosen -- Secure voting using partially compatible homomorphisms / Kazue Sako and Joe Kilian -- Maintaining security in the presence of transient faults / Ran Canetti and Amir Herzberg
Summary This volume constitutes the proceedings of CRYPTO '94, the 14th International Cryptology Conference, held at Santa Barbara, CA, USA in August 1994 under the sponsorship of the International Association for Cryptologic Research (IACR). The proceedings contains revised versions of the 38 papers selected for presentation at the conference from a total of 114 submissions. All aspects of cryptologic research and advanced applications are addressed; in particular there are sections on block ciphers, signatures, implementation and hardware aspects, authentication and secret sharing, zero-knowledge, combinatorics, number theory, cryptanalysis and protocol failures, and secure computations and protocols
Bibliography Includes bibliographical references and index
Notes Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. MiAaHDL
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Print version record
Subject Computers -- Access control -- Congresses
Cryptography -- Congresses
Computers -- Access control
Cryptographie -- Congrès.
Ordinateurs -- Accès -- Contrôle -- Congrès.
Genre/Form Conference papers and proceedings
Form Electronic book
Author Desmedt, Yvo.
International Association for Cryptologic Research.
IEEE Computer Society. Technical Committee on Security and Privacy.
ISBN 9783540486589
Other Titles CRYPTO '94