+612 9045 4394
 
CHECKOUT
Advances in Cryptology - Crypto '97 : 17th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 17-21, 1997, Proceedings - Burton S. Kaliski

Advances in Cryptology - Crypto '97

17th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 17-21, 1997, Proceedings

By: Burton S. Kaliski (Editor)

Paperback

Published: 6th August 1997
Ships: 15 business days
15 business days
$185.75
or 4 easy payments of $46.44 with Learn more

This book constitutes the refereed proceedings of the 17th Annual International Cryptology Conference, CRYPTO'97, held in Santa Barbara, California, USA, in August 1997 under the sponsorship of the International Association for Cryptologic Research (IACR).
The volume presents 35 revised full papers selected from 160 submissions received. Also included are two invited presentations. The papers are organized in sections on complexity theory, cryptographic primitives, lattice-based cryptography, digital signatures, cryptanalysis of public-key cryptosystems, information theory, elliptic curve implementation, number-theoretic systems, distributed cryptography, hash functions, cryptanalysis of secret-key cryptosystems.

The Complexity of Computing Hard Core Predicatesp. 1
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relationsp. 16
Keeping the SZK-Verifier Honest Unconditionallyp. 31
On the Foundations of Modern Cryptographyp. 46
Plug and Play Encryptionp. 75
Deniable Encryptionp. 90
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystemp. 105
Public-Key Cryptosystems from Lattice Reduction Problemsp. 112
RSA-Based Undeniable Signaturesp. 132
Security in Blind Digital Signaturesp. 150
Digital Signcryption or How to Achieve Cost (Signature and Encryption) [[ Cost (Signatures) + Cost (Encryption)p. 165
How to Sign Digital Streamsp. 180
Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizationsp. 198
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attackp. 213
A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancyp. 221
On the Security of the KMOV Public Key Cryptosystemp. 235
A Key Recovery Attack on Discrete Log-Based Schemes Using a Prime Order Subgroupp. 249
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystemsp. 264
"Pseudo-Random" Number Generation within Cryptographic Algorithm: The DSS Casep. 277
Unconditional Security Against Memory-Bounded Adversariesp. 292
Privacy Amplification Secure Against Active Adversariesp. 307
Visual Authentication and Identificationp. 322
Quantum Information Processing: The Good, the Bad and the Uglyp. 337
Efficient Algorithms for Elliptic Curve Cryptosystemsp. 342
An Improved Algorithm for Arithmetic on a Family of Elliptic Curvesp. 357
Fast RSA-Type Cryptosystems Using n-adic Expansionp. 372
A One Way Function Based on Ideal Arithmetic in Number Fieldsp. 385
Efficient Anonymous Multicast and Receptionp. 395
Efficient Group Signature Schemes for Large Groupsp. 410
Efficient Generation of Shared RSA Keysp. 425
Proactive RSAp. 440
Towards Realizing Random Oracles: Hash Functions that Hide All Partial Informationp. 455
Collision-Resistant Hashing: Towards Making UOWHFs Practicalp. 470
Fast and Secure Hashing Based on Codesp. 485
Edit Distance Correlation Attack on the Alternating Step Generatorp. 499
Differential Fault Analysis of Secret Key Cryptosystemsp. 513
Cryptanalysis of the Cellular Message Encryption Algorithmp. 526
Author Indexp. 539
Erratump. 540
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540633846
ISBN-10: 3540633847
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 546
Published: 6th August 1997
Publisher: SPRINGER VERLAG GMBH
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.92
Weight (kg): 0.79