+612 9045 4394
 
CHECKOUT
Advances in Cryptology-EUROCRYPT '95 : International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceedings : Lecture Notes in Computer Science - Louis C. Guillou

Advances in Cryptology-EUROCRYPT '95 : International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceedings

Lecture Notes in Computer Science

By: Louis C. Guillou (Editor), Jean-Jacques Quisquater (Editor)

Hardcover

Ships: 7 to 10 business days
7 to 10 business days
RRP $244.99
$169.25
31%
OFF
or 4 easy payments of $42.31 with Learn more

This volume constitutes the proceedings of EUROCRYPT '95, the 1995 International Workshop on the Theory and Application of Cryptographic Techniques, held in Saint-Malo, France in May 1995 under the sponsorship of the International Association for Cryptologic Research (IACR). The volume contains revised versions of the 33 papers selected from a total of 113 submissions which address aspects of cryptologic research and advanced applications. Sections discussed include: cryptanalysis; signatures; computational number theory; cryptographic protocols; secret sharing; electronic cash; shift registers and Boolean functions; authentication codes; new schemes; complexity aspects; and implementation aspects.

Attacking the Chor-Rivest cryptosystem by improved lattice reductionp. 1
Convergence in differential distributionsp. 13
A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemmap. 24
On the efficiency of group signatures providing information-theoretic anonymityp. 39
Verifiable signature sharingp. 50
Server (prover / signer)-aided verification of identity proofs and signaturesp. 64
Counting the number of points on elliptic curves over finite fields: strategies and performancesp. 79
An implementation of the general number field sieve to compute discrete logarithms mod pp. 95
A block Lanczos algorithm for finding dependencies over GF(2)p. 106
How to break another "provably secure" payment systemp. 121
Quantum oblivious mutual identificationp. 133
Securing traceability of ciphertexts - Towards a secure software key escrow systemp. 147
Secure multiround authentication protocolsp. 158
Verifiable secret sharing as secure computationp. 168
Efficient secret sharing without a mutually trusted authorityp. 183
General short computational secret sharing schemesp. 194
Fair blind signaturesp. 209
Ripping coins for a fair exchangep. 220
Restrictive blinding of secret-key certificatesp. 231
Towards fast correlation attacks on irregularly clocked shift registersp. 248
Large periods nearly de Bruijn VCSR sequencesp. 263
On-nonlinear resilient functionsp. 274
Combinatorial bounds for authentication codes with arbitrationp. 289
New hash functions for message authenticationp. 301
A[superscript 2]-codes from universal hash classesp. 311
A new identification scheme based on the perceptrons problemp. 319
Fast RSA-type schemes based on singular cubic curves [actual symbol not reproducible]p. 329
Relationships among the computational powers of breaking discrete log cryptosystemsp. 341
Universal hash functions and hard core bitsp. 356
Recycling random bits in composed perfect zero-knowledgep. 367
On the Matsumoto and Imai's human identification schemep. 382
Receipt-free mix-type voting scheme A practical solution to the implementing of a voting boothp. 393
Are crypto-accelerators really inevitable? 20 bit zero-knowledge in less than a second on simple 8-bit microcontrollersp. 404
Anonymous NIZK proofs of knowledge with preprocessingp. 413
Author Indexp. 417
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540594093
ISBN-10: 3540594094
Series: Lecture Notes in Computer Science
Audience: Professional
Format: Hardcover
Language: English
Number Of Pages: 417
Publisher: SPRINGER VERLAG GMBH
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.24
Weight (kg): 0.6