+612 9045 4394
Advances in Cryptology : Lecture Notes in Computer Science - Douglas R. Stinson

Advances in Cryptology

Lecture Notes in Computer Science

By: Douglas R. Stinson (Editor)

Paperback ISBN: 9783540577669
Number Of Pages: 491

Share This Book:


or 4 easy payments of $33.88 with Learn more
Ships in 5 to 9 business days

This volume contains the papers presented at the CRYPTO '93 conference. The conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom) and held in cooperation with the IEEE Computer Society. These proceedings contain revised versions of the 38 contributed talks, as well as two talks from the rump session. The papers are grouped into parts on: cryptosystems, stream ciphers and cryptographic functions, proof systems and zero-knowledge, secret sharing, number theory and algorithms, differential cryptanalysis, complexity theory, applications, authentication codes, hash functions, cryptanalysis, and key distribution.

Cryptosystems.- Efficient Signature Schemes Based on Birational Permutations.- A new identification scheme based on syndrome decoding.- The Shrinking Generator.- Stream Ciphers and Cryptographic Functions.- An Integrity Check Value Algorithm for Stream Ciphers.- Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics.- Proof Systems and Zero-knowledge.- A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity.- Secret Sharing and Perfect Zero Knowledge.- One Message Proof Systems with Known Space Verifiers.- Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions.- Secret Sharing.- Fully Dynamic Secret Sharing Schemes.- Multisecret Threshold Schemes.- Secret Sharing Made Short.- Number Theory and Algorithms.- A Subexponential Algorithm for Discrete Logarithms over All Finite Fields.- An implementation of the general number field sieve.- On the factorization of RSA-120.- Comparison of three modular reduction functions.- Differential Cryptanalysis.- Differential Cryptanalysis of Lucifer.- Differential Attack on Message Authentication Codes.- Cryptanalysis of the CFB mode of the DES with a reduced number of rounds.- Weak Keys for IDEA.- Complexity Theory.- Entity Authentication and Key Distribution.- On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures.- Joint Encryption and Message-Efficient Secure Computation.- Cryptographic Primitives Based on Hard Learning Problems.- Applications.- Extensions of Single-term Coins.- Untraceable Off-line Cash in Wallet with Observers.- Discreet Solitary Games.- Authentication Codes.- On Families of Hash Functions via Geometric Codes and Concatenation.- On the Construction of Perfect Authentication Codes that Permit Arbitration.- Codes for Interactive Authentication.- Hash Functions.- Hash functions based on block ciphers: a synthetic approach.- Security of Iterated Hash Functions Based on Block Ciphers.- Cryptanalysis.- Improved Algorithms for the Permuted Kernel Problem.- On the Distribution of Characteristics in Composite Permutations.- Remark on the Threshold RSA Signature Scheme.- Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks.- Attacks on the Birational Permutation Signature Schemes.- Key Distribution.- Interaction in Key Distribution Schemes.- Secret-Key Agreement without Public-Key Cryptography.- Broadcast Encryption.

ISBN: 9783540577669
ISBN-10: 3540577661
Series: Lecture Notes in Computer Science
Audience: Professional
Format: Paperback
Language: English
Number Of Pages: 491
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.57
Weight (kg): 0.7