Description |
1 online resource : v.: digital |
Series |
Lecture Notes in Computer Science, 0302-9743 ; 917 |
|
Lecture notes in computer science ; 917. 0302-9743
|
Contents |
Multifeature security through homomorphic encryption -- Multiplicative non-abelian sharing schemes and their application to threshold cryptography -- Lower bound on the size of shares of nonperfect secret sharing schemes -- On sharing many secrets -- Combinatorial interpretation of secret sharing schemes -- A correlation attack on the binary sequence generators with time-varying output function -- On the linear complexity of nonlinearly filtered PN-sequences -- Intrinsic statistical weakness of keystream generators -- Semi-bent functions -- Structures of cryptographic functions with strong avalanche characteristics -- Formal verification of cryptographic protocols: A survey -- Efficient electronic money -- How to prevent buying of votes in computer elections -- Design and analysis of key exchange protocols via secure channel identification -- Zero-knowledge proofs of computational power in the shared string model -- Information security aspects of spread spectrum systems -- Combinatorial structure of A-codes with r-fold security -- Meta-Message recovery and Meta-Blind signature schemes based on the discrete logarithm problem and their applications -- A digital signature scheme based on linear error-correcting block codes -- Secure acceleration of DSS signatures using insecure server -- The magic words are squeamish ossifrage -- Cryptanalysis of multiple modes of operation -- Linear cryptanalysis of LOKI and s 2DES -- Collisions and inversions for Damgård's whole hash function -- Attacking the SL 2 hashing scheme -- Security of the center in key distribution schemes -- Incidence structures for key sharing -- A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms -- Higher radix nonrestoring modular multiplication algorithm and public-key LSI architecture with limited hardware resources -- Low exponent attack against elliptic curve RSA -- A unified Markov approach to differential and linear cryptanalysis -- How to strengthen DES using existing hardware -- Some cryptographic properties of exponential functions -- Factoring: The DNA solution -- Can one design a signature scheme based on error-correcting codes? -- DESV-1: A variation of the Data Encryption Standard (DES) |
Summary |
This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994. Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms |
Bibliography |
Includes bibliographical references and index |
Subject |
Computer science.
|
|
Computer Communication Networks
|
|
Data encryption (Computer science)
|
|
Coding theory.
|
|
Combinatorial analysis.
|
|
Electronic data processing.
|
|
data processing.
|
|
computer science.
|
|
Electronic data processing
|
|
Coding theory
|
|
Combinatorial analysis
|
|
Computer science
|
|
Data encryption (Computer science)
|
Form |
Electronic book
|
Author |
Pieprzyk, Josef, 1949-
|
|
Safavi-Naini, Reihanah.
|
ISBN |
9783540492368 |
|
3540492364 |
|