+612 9045 4394
 
CHECKOUT
Advances in Cryptology-EUROCRYPT'97 : International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceedings : Lecture Notes in Computer Science, - Walter Fumy

Advances in Cryptology-EUROCRYPT'97 : International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceedings

Lecture Notes in Computer Science,

By: Walter Fumy (Editor)

Paperback ISBN: 9783540629757
Number Of Pages: 509

Share This Book:

Paperback

$147.02
or 4 easy payments of $36.76 with Learn more
Ships in 5 to 9 business days

This text constitutes the refereed proceedings of the 15th Conference on the Theory and Application of Cryptographic Techniques. The 34 revised full papers included were carefully selected from a total of 104 submissions. The papers addresses issues such as the booming area of research and development in cryptology and advances in application areas including security and privacy, digital communication, and electronic commerce.

Two Attacks on Reduced IDEAp. 1
Combinatorial Properties of Basic Encryption Operationsp. 14
A New Public-Key Cryptosystemp. 27
On the Importance of Checking Cryptographic Protocols for Faultsp. 37
Lattice Attacks on NTRUp. 52
Kleptography: Using Cryptography Against Cryptographyp. 62
Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonationp. 75
Anonymous Fingerprintingp. 88
A Secure and Optimally Efficient Multi-Authority Election Schemep. 103
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposalsp. 119
The GCHQ Protocol and Its Problemsp. 134
Bucket Hashing with a Small Key Sizep. 149
A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Costp. 163
Smooth Entropy and Renyi Entropyp. 193
Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussionp. 209
Linear Statistical Weakness of Alleged RC4 Keystream Generatorp. 226
Cryptanalysis of Alleged A5 Stream Cipherp. 239
Lower Bounds for Discrete Logarithms and Related Problemsp. 256
Stronger Security Proofs for RSA and Rabin Bitsp. 267
Round-Optimal Zero-Knowledge Arguments Based on Any One-Way Functionp. 280
Efficient Cryptographic Protocols Based on Noisy Channelsp. 306
Rapid Demonstration of Linear Relations Connected by Boolean Operatorsp. 318
Oblivious Transfers and Privacy Amplificationp. 334
SHA: A Design for Parallel Architectures?p. 348
Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2[superscript n])[superscript m])p. 363
Finding Good Random Elliptic Curves for Cryptosystems Defined over F[subsctipt 2][superscript u]p. 379
Incremental Cryptography and Memory Checkersp. 393
Almost k-wise Independent Sample Spaces and Their Cryptologic Applicationsp. 409
More Correlation-Immune and Resilient Functions over Galois Fields and Galois Ringsp. 422
Design of SAC/PC(1) of Order k Boolean Functions and Three Other Cryptographic Criteriap. 434
Distributed "Magic Ink" Signaturesp. 450
Efficient and Generalized Group Signaturesp. 465
Collision-Free Accumulators and Fail-Stop Signature Schemes Without Treesp. 480
Selective Forgery of RSA Signatures Using Redundancyp. 495
Author Indexp. 509
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540629757
ISBN-10: 3540629750
Series: Lecture Notes in Computer Science,
Audience: General
Format: Paperback
Language: English
Number Of Pages: 509
Publisher: SPRINGER VERLAG GMBH
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.67
Weight (kg): 0.73