© 1996

Advances in Cryptology — CRYPTO ’96

16th Annual International Cryptology Conference Santa Barbara, California, USA August 18–22, 1996 Proceedings

  • Neal Koblitz
Conference proceedings CRYPTO 1996

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1109)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Hashing and Authentication I

    1. Mihir Bellare, Ran Canetti, Hugo Krawczyk
      Pages 1-15
    2. M. Atici, D. R. Stinson
      Pages 16-30
  3. New Systems

    1. Daniel R. Simon
      Pages 61-73
  4. Asymmetric Systems

  5. Hard Bits

  6. Signatures

    1. Rosario Gennaro, Stanisław Jarecki, Hugo Krawczyk, Tal Rabin
      Pages 157-172
    2. Ronald Cramer, Ivan Damgård
      Pages 173-185
  7. Zero Knowledge

  8. Symmetric Systems

    1. Lars R. Knudsen, Willi Meier
      Pages 216-228
    2. Paul C. van Oorschot, Michael J. Wiener
      Pages 229-236
  9. More on Symmetric Systems

    1. John Kelsey, Bruce Schneier, David Wagner
      Pages 237-251

About these proceedings


Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and P- vacy and the Computer Science Department of the University of California at Santa Barbara (UCSB). It takes place at UCSB from August 18 to 22, 1996. The General Chair, Richard Graveman, is responsible for local organization and registration. The scientific program was organized by the 16-member Program C- mittee. We considered 115 papers. (An additional 15 submissions had to be summarily rejected because of lateness or major noncompliance with the c- ditions in the Call for Papers.) Of these, 30 were accepted for presentation. In addition, there will be five invited talks by Ernest Brickell. Andrew Clark, Whitfield Diffie, Ronald Rivest, and Cliff Stoll. A Rump Session will be chaired by Stuart Haber. These proceedings contain the revised versions of the 30 contributed talks. least three com- The submitted version of each paper was examined by at mittee members and/or outside experts, and their comments were taken into account in the revisions. However, the authors (and not the committee) bear full responsibility for the content of their papers.


Datenverschlüsselung Digitale Signaturen Kryptoanalyse Kryptographische Protokolle Quatencryptographi authentication cryptoanalysis cryptographic protocol cryptography cryptology data encryption digital signature digital signatures encryption

Editors and affiliations

  • Neal Koblitz
    • 1
  1. 1.Department of Mathematics SeattleUniversity of WashingtonWashingtonUSA

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking