Advertisement

Advances in Cryptology — CRYPTO ’91

Proceedings

  • Joan Feigenbaum

Part of the Lecture Notes in Computer Science book series (LNCS, volume 576)

Table of contents

  1. Front Matter
    Pages I-X
  2. Protocol Design and Analysis

    1. M. Abadi, M. Burrows, B. Lampson, G. Plotkin
      Pages 1-23
    2. Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva et al.
      Pages 44-61
  3. Combinatorics and Authentication

    1. D. R. Stinson
      Pages 74-85
    2. P. Camion, C. Carlet, P. Charpin, N. Sendrier
      Pages 86-100
  4. Secret Sharing and Information Theory

    1. R. M. Capocelli, A. De Santis, L. Gargano, U. Vaccaro
      Pages 101-113
    2. Cynthia Dwork
      Pages 114-128
    3. Michael J. Fischer, Rebecca N. Wright
      Pages 141-155
  5. Cryptanalysis

    1. Anne Tardy-Corfdir, Henri Gilbert
      Pages 172-182
    2. Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi
      Pages 183-193
    3. Bert den Boer, Antoon Bosselaers
      Pages 194-203
    4. Yeow Meng Chee, Antoine Joux, Jacques Stern
      Pages 204-212
  6. Complexity Theory

  7. Cryptographic Schemes Based on Number Theory

    1. Kenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone
      Pages 252-266
    2. Tatsuaki Okamoto, Kouichi Sakurai
      Pages 267-278
    3. Shigeo Tsujii, Jinhui Chao
      Pages 288-299
  8. Pseudorandomness

  9. Applications and Implementations

    1. Colin D. Walter
      Pages 313-323
    2. Tatsuaki Okamoto, Kazuo Ohta
      Pages 324-337
    3. Birgit Pfitzmann, Michael Waidner
      Pages 338-350
    4. Charles H. Bennett, Gilles Brassard, Claude Crépeau, Marie-Hélène Skubiszewska
      Pages 351-366
    5. Albert G. Broscius, Jonathan M. Smith
      Pages 367-376
  10. Secure Computation Protocols

    1. Donald Beaver
      Pages 377-391
    2. Silvio Micali, Phillip Rogaway
      Pages 392-404
  11. Public-Key Cryptosystems and Signatures

  12. Back Matter
    Pages 485-485

About these proceedings

Keywords

Informationstheorie Komplexitätstheorie Kryptologie System Security authentication coding theory complexity complexity theory cryptoanalysis cryptology cryptosystem digital signature information theory secret sharing systems security

Editors and affiliations

  • Joan Feigenbaum
    • 1
  1. 1.AT&T Bell LaboratoriesMurray HillUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-46766-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 1992
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-55188-1
  • Online ISBN 978-3-540-46766-3
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace