Advertisement

Advances in Cryptology — CRYPTO ’94

14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings

  • Yvo G. Desmedt

Part of the Lecture Notes in Computer Science book series (LNCS, volume 839)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Block Ciphers: Differential and Linear Cryptanalysis

    1. Kazuo Ohta, Kazumaro Aoki
      Pages 12-16
    2. Susan K. Langford, Martin E. Hellman
      Pages 17-25
    3. Burton S. Kaliski Jr., M. J. B. Robshaw
      Pages 26-39
  3. Schemes Based on New Problems

    1. Jean-Pierre Tillich, Gilles Zémor
      Pages 40-49
    2. Ingrid Biehl, Johannes Buchmann, Christoph Thiel
      Pages 56-60
  4. Signatures I

  5. Implementation and Hardware Aspects

    1. Chae Hoon Lim, Pil Joong Lee
      Pages 95-107
    2. Tamás Horváth, Spyros S. Magliveras, Tran van Trung
      Pages 108-113
    3. Don Davis, Ross Ihaka, Philip Fenstermacher
      Pages 114-120
  6. Authentication and Secret Sharing

    1. Hugo Krawczyk
      Pages 129-139
    2. Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro
      Pages 150-163
  7. Zero-Knowledge

    1. Ronald Cramer, Ivan Damgård, Berry Schoenmakers
      Pages 174-187
    2. Toshiya Itoh, Yuji Ohta, Hiroki Shizuya
      Pages 188-201
  8. Signatures II

    1. Mihir Bellare, Oded Goldreich, Shafi Goldwasser
      Pages 216-233
  9. Combinatorics and its Applications

    1. Jürgen Bierbrauer, K. Gopalakrishnan, D. R. Stinson
      Pages 247-256
    2. Benny Chor, Amos Fiat, Moni Naor
      Pages 257-270
  10. Number Theory

  11. Cryptanalysis and Protocol Failures

    1. Don Coppersmith
      Pages 294-307
    2. Mike Burmester
      Pages 308-317
    3. Th. Beth, D. E. Lazic, A. Mathias
      Pages 318-331
  12. Pseudo-Random Generation

  13. Block Ciphers: Design and Cryptanalysis

    1. Mihir Bellare, Joe Kilian, Phillip Rogaway
      Pages 341-358
    2. Henri Gilbert, Pascal Chauvaud
      Pages 359-368
    3. Yukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu
      Pages 369-382
    4. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
      Pages 383-396
  14. Secure Computations and Protocols

    1. Eyal Kushilevitz, Adi Rosén
      Pages 397-410
    2. Kazue Sako, Joe Kilian
      Pages 411-424
    3. Ran Canetti, Amir Herzberg
      Pages 425-438
  15. Back Matter
    Pages 439-439

About these proceedings

Introduction

The CRYPTO ’94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the fourteenth annual CRYPTO conference, all of which have been held at UCSB. This is the first time that proceedings are available at the conference. The General Chair, Jimmy R. Upton has been responsible for local organization, registration, etc. There were 114 submitted papers which were considered by the Program Committee. Of these, 1 was withdrawn and 38 were selected for the proce- ings. There are also 3 invited talks. Two of these are on aspects of cryptog- phy in the commercial world. The one on hardware aspects will be presented by David Maher (AT&T), the one on software aspects by Joseph Pato (Hewlett- Packard). There will also be a panel discussion on “Securing an Electronic World: Are We Ready?” The panel members will be: Ross Anderson, Bob Blakley, Matt Blaze, George Davida, Yvo Desmedt (moderator), Whitfield Diffie, Joan Feig- baum, Blake Greenlee, Martin Hellman, David Maher, Miles Smid. The topic of the panel will be introduced by the invited talk of Whitfield Diffie on ”Securing the Information Highway. ” These proceedings contain revised versions of the 38 contributed talks. Each i paper was sent to at least 3 members of the program committee for comments.

Keywords

Authentizität Block Ciphers Blockziffern Combinatorics Kryptosysteme Signaturen Signatures Zero-Knowledge authentication cryptoanalysis cryptology cryptosystems secret sharing

Editors and affiliations

  • Yvo G. Desmedt
    • 1
  1. 1.Department of EE & CSUniversity of Wisconsin - MilwaukeeMilwaukeeUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-48658-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 1994
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-58333-2
  • Online ISBN 978-3-540-48658-9
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace