Advertisement

Table of contents

  1. Front Matter
  2. Ingrid Biehl, Bernd Meyer, Christoph Thiel
    Pages 15-25
  3. Ross Anderson, Serge Vaudenay
    Pages 26-35
  4. Mike Just, Serge Vaudenay
    Pages 36-49
  5. Erik De Win, Antoon Bosselaers, Servaas Vandenberghe, Peter De Gersem, Joos Vandewalle
    Pages 65-76
  6. Lars Knudsen, Bart Preneel
    Pages 77-90
  7. Kaisa Nyberg
    Pages 91-104
  8. Philip Hawkes, Luke O'Connor
    Pages 105-115
  9. Chun-I. Fan, Chin-Laung Lei
    Pages 116-124
  10. Jianying Zhou, Dieter Gollmann
    Pages 133-144
  11. Daniel Bleichenbacher, Ueli Maurer
    Pages 145-158
  12. Kaoru Kurosawa, Takashi Satoh
    Pages 218-231
  13. Seongtaek Chee, Sangjin Lee, Daiki Lee, Soo Hak Sung
    Pages 232-243
  14. Masayuki Abe, Eiichiro Fujisaki
    Pages 244-251
  15. David Pointcheval, Jacques Stern
    Pages 252-265
  16. Agnes Chan, Yair Frankel, Philip MacKenzie, Yiannis Tsiounis
    Pages 276-285
  17. Yair Frankel, Yiannis Tsiounis, Moti Yung
    Pages 286-300
  18. Jacques Stern
    Pages 301-310
  19. Seung Joo Kim, Sung Jun Park, Dong Ho Won
    Pages 311-321
  20. Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto
    Pages 322-333
  21. Markus Michels, Patrick Horster
    Pages 334-345
  22. Willi Geiselmann, Dieter Gollmann
    Pages 346-359
  23. Sangjin Lee, Seongtaek Chee, Sangjoon Park, Sungmo Park
    Pages 360-367
  24. James Cowie, Bruce Dodson, R. Marije Elkenbracht-Huizing, Arjen K. Lenstra, Peter L. Montgomery, Jörg Zayer
    Pages 382-394
  25. Back Matter

About these proceedings

Introduction

This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996.
The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems.

Keywords

Boolean function algorithm algorithms cryptology data security information information security

Bibliographic information

  • DOI https://doi.org/10.1007/BFb0034829
  • Copyright Information Springer-Verlag 1996
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-61872-0
  • Online ISBN 978-3-540-70707-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Biotechnology
Electronics
IT & Software
Telecommunications