+612 9045 4394
 
CHECKOUT
Advances in Cryptology - Crypto '98 : 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings :  18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings - Hugo Krawczyk

Advances in Cryptology - Crypto '98 : 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings

18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings

By: Hugo Krawczyk (Editor)

Paperback

Published: September 1998
Ships: 5 to 9 business days
5 to 9 business days
$169.73
or 4 easy payments of $42.43 with Learn more

This book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO'98, held in Santa Barbara, California, USA, in August 1998. The book presents 33 revised full papers selected from a total of 144 submissions received. Also included are two invited presentations. The papers are organized in topical sections on chosen ciphertext security, cryptanalysis of hash functions and block ciphers, distributed cryptography, zero knowledge, and implementation.

Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1p. 1
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attackp. 13
Relations Among Notions of Security for Public-Key Encryption Schemesp. 26
Cryptography and the Internetp. 46
Differential Collisions in SHA-0p. 56
From Differential Cryptanalysis to Ciphertext-Only Attacksp. 72
A Simplified Approach to Threshold and Proactive RSAp. 89
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applicationsp. 105
Trading Correctness for Privacy in Unconditional Multi-party Computationp. 121
Fast Digital Identity Revocationp. 137
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptopp. 153
Identity Escrowp. 169
Generalized Birthday Attacks on Unbalanced Feistel Networksp. 186
Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DESp. 200
Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degreep. 212
Cryptanalysis of the Ajtai-Dwork Cryptosystemp. 223
Cryptanalysis of the Chor-Rivest Cryptosystemp. 243
Cryptanalysis of the Oil and Vinegar Signature Schemep. 257
From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACsp. 267
Many-to-One Trapdoor Functions and their Relation to Public-Key Cryptosystemsp. 283
Authentication, Enhanced Security and Error Correcting Codesp. 299
An Efficient Discrete Log Pseudo Random Generatorp. 304
Fast RSA-type Cryptosystem Modulo p[superscript k]qp. 318
An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithmp. 327
Quantum Bit Commitment from a Physical Assumptionp. 338
On Concrete Security Treatment of Signatures Derived from Identificationp. 354
Building PRFs from PRPsp. 370
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphersp. 390
On the Existence of 3-Round Zero-Knowledge Protocolsp. 408
Zero-Knowledge Proofs for Finite Field Arithmetic, or: Can Zero-Knowledge Be for Free?p. 424
Concurrent Zero-Knowledge: Reducing the Need for Timing Constraintsp. 442
The Solution of McCurley's Discrete Log Challengep. 458
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithmsp. 472
Time-Stamping with Binary Linking Schemesp. 486
Threshold Traitor Tracingp. 502
Author Indexp. 519
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540648925
ISBN-10: 3540648925
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 524
Published: September 1998
Publisher: SPRINGER VERLAG GMBH
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.79
Weight (kg): 0.75