Advertisement

Advances in Cryptology — EUROCRYPT’ 92

Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24–28, 1992 Proceedings

  • Rainer A. Rueppel

Part of the Lecture Notes in Computer Science book series (LNCS, volume 658)

Table of contents

  1. Front Matter
    Pages i-x
  2. Secret Sharing

    1. C. Blundo, A. De Santis, D. R. Stinson, U. Vaccaro
      Pages 1-24
  3. Hash Functions

    1. T. Baritaud, H. Gilbert, M. Girault
      Pages 35-44
    2. Xucjia Lai, James L. Massey
      Pages 55-70
  4. Block Ciphers

  5. Stream Ciphers

  6. Public Key I

    1. Birgit Pfitzmann, Michael Waidner
      Pages 153-162
    2. Greg Harper, Alfred Menezes, Scott Vanstone
      Pages 163-173
  7. Factoring

    1. B. Dixon, A. K. Lenstra
      Pages 183-193
  8. The Eurocrypt’92 Controversial Issue Trapdoor Primes and Moduli

  9. Public Key II

    1. Ernest F. Brickell, Daniel M. Gordon, Kevin S. McCurley, David B. Wilson
      Pages 200-207
    2. Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
      Pages 221-238
  10. Pseudo-random Permutation Generators

  11. Complexity Theory and Cryptography I

  12. Zero-Knowledge

    1. Kazuo Ohta, Tatsuaki Okamoto, Atsushi Fujioka
      Pages 324-340
    2. Ingrid Biehl, Johannes Buchmann, Bernd Meyer, Christian Thiel, Christoph Thiel
      Pages 356-365
  13. Digital Signatures and Electronic Cash

    1. Eugène van Heyst, Torben Pryds Pedersen
      Pages 366-377
    2. David Chaum, Torben Pryds Pedersen
      Pages 390-407
  14. Complexity Theory and Cryptography II

    1. H. Niederreiter, C. P. Schnorr
      Pages 408-419
    2. Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya
      Pages 420-428
    3. Ueli M. Maurer
      Pages 429-436
  15. Applications

  16. Selected Papers from the Rump Session

  17. Back Matter
    Pages 493-493

About these proceedings

Introduction

A series of workshops devoted to modern cryptography began in Santa Barbara,California in 1981 and was followed in 1982 by a European counterpart in Burg Feuerstein, Germany. The series has been maintained with summer meetings in Santa Barbara and spring meetings somewhere in Europe. At the 1983 meeting in Santa Barbara the International Association for Cryptologic Research was launched and it now sponsors all the meetings of the series. This volume presents the proceedings of Eurocrypt '92, held in Hungary. The papers are organized into the following parts: Secret sharing, Hash functions, Block ciphers, Stream ciphers, Public key I, Factoring, Trapdoor primes and moduli (panel report), Public key II, Pseudo-random permutation generators, Complexity theory and cryptography I, Zero-knowledge, Digital knowledge and electronic cash, Complexity theory andcryptography II, Applications, and selected papers from the rump session. Following the tradition of the series, the authors produced full papers after the meeting, in some cases with revisions.

Keywords

Cryptanalysis Komplexitätstheorie Krypto-Analysis Permutation Pseudo-Zufall-Permutationen Public-Key-Cryptosystems Public-Key-Kryptosysteme Z complexity theory cryptoanalysis cryptography cryptology cryptosystems hash function secret sharing

Editors and affiliations

  • Rainer A. Rueppel
    • 1
  1. 1.R3 Security EngineeringWetzikonSwitzerland

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-47555-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 1993
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-56413-3
  • Online ISBN 978-3-540-47555-2
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace