Advances in Cryptology — CRYPTO ’94 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21–25, 1994. Proceedings / edited by Yvo G. Desmedt.

The CRYPTO ’94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Desmedt, Yvo G. (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1994.
Edition:1st ed. 1994.
Series:Lecture Notes in Computer Science, 839
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Block Ciphers: Differential and Linear Cryptanalysis
  • The First Experimental Cryptanalysis of the Data Encryption Standard
  • Linear Cryptanalysis of the Fast Data Encipherment Algorithm
  • Differential-Linear Cryptanalysis
  • Linear Cryptanalysis Using Multiple Approximations
  • Schemes Based on New Problems
  • Hashing with SL 2
  • Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks
  • Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders
  • Signatures I
  • Designated Confirmer Signatures and Public-Key Encryption are Equivalent
  • Directed Acyclic Graphs, One-way Functions and Digital Signatures
  • An Identity-Based Signature Scheme with Bounded Life-Span
  • Implementation and Hardware Aspects
  • More Flexible Exponentiation with Precomputation
  • A Parallel Permutation Multiplier for a PGM Crypto-chip
  • Cryptographic Randomness from Air Turbulence in Disk Drives
  • Authentication and Secret Sharing
  • Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol
  • LFSR-based Hashing and Authentication
  • New Bound on Authentication Code with Arbitration
  • Multi-Secret Sharing Schemes
  • Zero-Knowledge
  • Designing Identification Schemes with Keys of Short Size
  • Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
  • Language Dependent Secure Bit Commitment
  • On the length of cryptographic hash-values used in identification schemes
  • Signatures II
  • Incremental Cryptography: The Case of Hashing and Signing
  • An Efficient Existentially Unforgeable Signature Scheme and its Applications
  • Combinatorics and its Applications
  • Bounds for Resilient Functions and Orthogonal Arrays
  • Tracing Traitors
  • Number Theory
  • Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms
  • Fast Generation of Provable Primes Using Search in Arithmetic Progressions
  • Cryptanalysis and Protocol Failures
  • Attack on the Cryptographic Scheme NIKS-TAS
  • On the Risk of Opening Distributed Keys
  • Cryptanalysis of Cryptosystems based on Remote Chaos Replication
  • Pseudo-Random Generation
  • A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences
  • Block Ciphers: Design and Cryptanalysis
  • The Security of Cipher Block Chaining
  • A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem
  • Ciphertext Only Attack for One-way function of the MAP using One Ciphertext
  • Pitfalls in Designing Substitution Boxes
  • Secure Computations and Protocols
  • A Randomness-Rounds Tradeoff in Private Computation
  • Secure Voting Using Partially Compatible Homomorphisms
  • Maintaining Security in the Presence of Transient Faults.