Skip to main content
  • Conference proceedings
  • © 1995

Advances in Cryptology — CRYPTO ’95

15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27–31, 1995. Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 963)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Cryptanalysis II

    1. Cryptanalysis Based on 2-Adic Rational Approximation

      • Andrew Klapper, Mark Goresky
      Pages 262-273
    2. A Key-schedule Weakness in SAFER K-64

      • Lars R. Knudsen
      Pages 274-286
    3. Cryptanalysis of the Immunized LL Public Key Systems

      • Yair Frankel, Moti Yung
      Pages 287-296
  2. Zero Knowledge, Interactive Protocols

    1. Secure Signature Schemes based on Interactive Protocols

      • Ronald Cramer, Ivan Damgård
      Pages 297-310
    2. Improved Efficient Arguments

      • Joe Kilian
      Pages 311-324
    3. Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs

      • Ivan Damgård, Oded Goldreich, Tatsuaki Okamoto, Avi Wigderson
      Pages 325-338
  3. Secret Sharing

    1. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

      • Amir Herzberg, Stanisław Jarecki, Hugo Krawczyk, Moti Yung
      Pages 339-352
    2. Secret Sharing with Public Reconstruction

      • Amos Beimel, Benny Chor
      Pages 353-366
    3. On General Perfect Secret Sharing Schemes

      • G. R. Blakley, G. A. Kabatianski
      Pages 367-371
  4. Number Theory II

    1. NFS with Four Large Primes: An Explosive Experiment

      • Bruce Dodson, Arjen K. Lenstra
      Pages 372-385
    2. Some Remarks on Lucas-Based Cryptosystems

      • Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra
      Pages 386-396
  5. Secret Sharing II

    1. Threshold DSS Signatures without a Trusted Party

      • Susan K. Langford
      Pages 397-409
    2. t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes

      • Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata
      Pages 410-423
  6. Everything Else

    1. Quantum Cryptanalysis of Hidden Linear Functions

      • Dan Boneh, Richard J. Lipton
      Pages 424-437
    2. An Efficient Divisible Electronic Cash Scheme

      • Tatsuaki Okamoto
      Pages 438-451
    3. Collusion-Secure Fingerprinting for Digital Data

      • Dan Boneh, James Shaw
      Pages 452-465
  7. Back Matter

    Pages 467-467

About this book

The Crypto ’95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. It took place at the University of California, Santa Barbara, from August 27-31, 1995. This was the fifteenth annual Crypto conference; all have been held at UCSB. For the second time, proceedings were available at the conference. The General Chair, Stafford Tavares, was responsible for local organization and registration. The Program Committee considered 151 papers and selected 36 for pres- tation. There were also two invited talks. Robert Morris, Sr. gave a talk on “Ways of Losing Information,” which included some non-cryptographic means of leaking secrets that are often overlooked by cryptographers. The second talk, “Cryptography - Myths and Realities,” was given by Adi Shamir, this year’s IACR Distinguished Lecturer. Shamir is the second person to receive this honor, the first having been Gus Simmons at Crypto ’94. These proceedings contain revised versions of the 36 contributed talks. Each paper was sent to at least three members of the program committee for c- ments. Revisions were not checked on their scientific aspects. Some authors will write final versions of their papers for publication in refereed journals. Of course, the authors bear full responsibility for the contents of their papers.

Editors and Affiliations

  • IBM T.J. Watson Research Center, Yorktown Heights, USA

    Don Coppersmith

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access