Table of contents

  1. Front Matter
  2. Yvo Desmedt
    Pages 1-14
  3. L. Tombak, R. Safavi-Naini
    Pages 15-26
  4. Yvo Desmedt, Jennifer Seberry
    Pages 27-32
  5. R. Safavi-Naini, L. Tombak
    Pages 33-47
  6. Wen-Ai Jackson, Keith M. Martin
    Pages 48-55
  7. Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii
    Pages 56-66
  8. Michael Bertilsson, Ingemar Ingemarsson
    Pages 67-79
  9. Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry
    Pages 81-104
  10. Bart Preneel, René Govaerts, Joos Vandewalle
    Pages 105-121
  11. Chris Charnes, Josef Pieprzyk
    Pages 156-164
  12. John Detombe, Stafford Tavares
    Pages 165-181
  13. Lars Ramkilde Knudsen
    Pages 196-208
  14. Ed Dawson
    Pages 209-215
  15. Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta
    Pages 244-251
  16. Takashi Satoh, Kaoru Kurosawa, Shigeo Tsujii
    Pages 252-260
  17. Jean Claude Pailles
    Pages 261-274
  18. Benjamin B. Nieh, Stafford E. Tavares
    Pages 275-295
  19. Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen
    Pages 296-307
  20. Chae Hoon Lim, Pil Joong Lee
    Pages 308-323
  21. Xuejia Lai, Rainer A. Rueppel, Jack Woollven
    Pages 339-348
  22. Jun-Hui Yang, Zong-Duo Dai
    Pages 357-363
  23. Manuel Cerecedo, Tsutomu Matsumoto, Hideki Imai
    Pages 385-396
  24. Chin-Chen Chang, Tzong-Chen Wu, C. P. Chen
    Pages 457-466
  25. Christian P. Waldvogel, James L. Massey
    Pages 492-504
  26. Bart Preneel, René Govaerts, Joos Vandewalle
    Pages 535-538
  27. Rudolf Lidl, Winfried B. Müller
    Pages 539-542
  28. Back Matter

About these proceedings


This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.


Computer Security Computersicherheit Cryptology Data Security Datensicherheit Hashing Public Key Cryptography Public-Key Kryptographie Secure Protocols Sichere Protokolle cryptography

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 1993
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-57220-6
  • Online ISBN 978-3-540-47976-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site