+612 9045 4394
 
CHECKOUT
Advances in Cryptology-EUROCRYPT '95 : International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceedings : Lecture Notes in Computer Science - Louis C. Guillou

Advances in Cryptology-EUROCRYPT '95 : International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceedings

Lecture Notes in Computer Science

By: Louis C. Guillou (Editor), Jean-Jacques Quisquater (Editor)

Hardcover ISBN: 9783540594093
Number Of Pages: 417

Share This Book:

Hardcover

RRP $238.99
$165.25
31%
OFF
or 4 easy payments of $41.31 with Learn more
Ships in 10 to 15 business days

This volume constitutes the proceedings of EUROCRYPT '95, the 1995 International Workshop on the Theory and Application of Cryptographic Techniques, held in Saint-Malo, France in May 1995 under the sponsorship of the International Association for Cryptologic Research (IACR). The volume contains revised versions of the 33 papers selected from a total of 113 submissions which address aspects of cryptologic research and advanced applications. Sections discussed include: cryptanalysis; signatures; computational number theory; cryptographic protocols; secret sharing; electronic cash; shift registers and Boolean functions; authentication codes; new schemes; complexity aspects; and implementation aspects.

Attacking the Chor-Rivest cryptosystem by improved lattice reductionp. 1
Convergence in differential distributionsp. 13
A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemmap. 24
On the efficiency of group signatures providing information-theoretic anonymityp. 39
Verifiable signature sharingp. 50
Server (prover / signer)-aided verification of identity proofs and signaturesp. 64
Counting the number of points on elliptic curves over finite fields: strategies and performancesp. 79
An implementation of the general number field sieve to compute discrete logarithms mod pp. 95
A block Lanczos algorithm for finding dependencies over GF(2)p. 106
How to break another "provably secure" payment systemp. 121
Quantum oblivious mutual identificationp. 133
Securing traceability of ciphertexts - Towards a secure software key escrow systemp. 147
Secure multiround authentication protocolsp. 158
Verifiable secret sharing as secure computationp. 168
Efficient secret sharing without a mutually trusted authorityp. 183
General short computational secret sharing schemesp. 194
Fair blind signaturesp. 209
Ripping coins for a fair exchangep. 220
Restrictive blinding of secret-key certificatesp. 231
Towards fast correlation attacks on irregularly clocked shift registersp. 248
Large periods nearly de Bruijn VCSR sequencesp. 263
On-nonlinear resilient functionsp. 274
Combinatorial bounds for authentication codes with arbitrationp. 289
New hash functions for message authenticationp. 301
A[superscript 2]-codes from universal hash classesp. 311
A new identification scheme based on the perceptrons problemp. 319
Fast RSA-type schemes based on singular cubic curves [actual symbol not reproducible]p. 329
Relationships among the computational powers of breaking discrete log cryptosystemsp. 341
Universal hash functions and hard core bitsp. 356
Recycling random bits in composed perfect zero-knowledgep. 367
On the Matsumoto and Imai's human identification schemep. 382
Receipt-free mix-type voting scheme A practical solution to the implementing of a voting boothp. 393
Are crypto-accelerators really inevitable? 20 bit zero-knowledge in less than a second on simple 8-bit microcontrollersp. 404
Anonymous NIZK proofs of knowledge with preprocessingp. 413
Author Indexp. 417
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540594093
ISBN-10: 3540594094
Series: Lecture Notes in Computer Science
Audience: Professional
Format: Hardcover
Language: English
Number Of Pages: 417
Publisher: SPRINGER VERLAG GMBH
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.24
Weight (kg): 0.6