×

zbMATH — the first resource for mathematics

Advances in cryptology - CRYPTO ’93. 13th annual international cryptology conference, Santa Barbara, CA, USA, August 22 - 26, 1993. Proceedings. (English) Zbl 0856.00053
Lecture Notes in Computer Science. 773. Berlin: Springer-Verlag. x, 492 p. (1994).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding conference (12, 1992) has been reviewed (see Zbl 0803.00037).
Indexed articles:
Shamir, Adi, Efficient signature schemes based on birational permutations, 1-12 [Zbl 0877.94041]
Stern, Jacques, A new identification scheme based on syndrome decoding, 13-21 [Zbl 0876.94035]
Coppersmith, Don; Krawczyk, Hugo; Mansour, Yishay, The shrinking generator, 22-39 [Zbl 0871.94018]
Taylor, Richard, An integrity check value algorithm for stream ciphers, 40-48 [Zbl 0871.94042]
Seberry, Jennifer; Zhang, Xian-Mo; Zheng, Yuliang, Nonlinearly balanced boolean functions and their propagation characteristics. (Extended abstract), 49-60 [Zbl 0870.94035]
Itoh, Toshiya; Hoshi, Masafumi; Tsujii, Shigeo, A low communication competitive interactive proof system for promised quadratic residuosity, 61-72 [Zbl 0871.94031]
De Santis, Alfredo; Di Crescenzo, Giovanni; Persiano, Giuseppe, Secret sharing and perfect zero knowledge, 73-84 [Zbl 0870.94025]
Aumann, Yonatan; Feige, Uriel, One message proof systems with known space verifiers, 85-99 [Zbl 0877.94027]
Damgård, Ivan B., Interactive hashing can simplify zero-knowledge protocol design without computational assumptions. (Extended abstract), 100-109 [Zbl 1126.94327]
Blundo, Carlo; Cresti, Antonella; De Santis, Alfredo; Vaccaro, Ugo, Fully dynamic secret sharing schemes, 110-125 [Zbl 0870.94022]
Jackson, Wen-Ai; Martin, Keith M.; O’Keefe, Christine M., Multisecret threshold schemes, 126-135 [Zbl 0871.94032]
Krawczyk, Hugo, Secret sharing made short, 136-146 [Zbl 0871.94034]
Adleman, Leonard M.; DeMarrais, Jonathan, A subexponential algorithm for discrete logarithms over all finite fields, 147-158 [Zbl 0871.11094]
Buchmann, J.; Loho, J.; Zayer, J., An implementation of the general number field sieve. (Extended abstract), 159-165 [Zbl 0871.11092]
Denny, T.; Dodson, B.; Lenstra, A. K.; Manasse, M. S., On the factorization of RSA-120, 166-174 [Zbl 0870.11078]
Bosselaers, Antoon; Govaerts, René; Vandewalle, Joos, Comparison of three modular reduction functions, 175-186 [Zbl 0871.94026]
Ben-Aroya, Ishai; Biham, Eli, Differential cryptanalysis of Lucifer, 187-199 [Zbl 0871.94024]
Ohta, Kazuo; Matsui, Mitsuru, Differential attack on message authentication codes, 200-211 [Zbl 0871.94037]
Preneel, Bart; Nuttin, Marnix; Rijmen, Vincent; Buelens, Johan, Cryptanalysis of the CFB mode of the DES with a reduced number of rounds, 212-223 [Zbl 0871.94040]
Daemen, Joan; Govaerts, René; Vandewalle, Joos, Weak keys for IDEA, 224-231 [Zbl 0877.94031]
Bellare, Mihir; Rogaway, Phillip, Entity authentication and key distribution, 232-249 [Zbl 0870.94019]
Damgård, Ivan B.; Pedersen, Torben P.; Pfitzmann, Birgit, On the existence of statistically hiding bit commitment schemes and fail-stop signatures, 250-265 [Zbl 0873.94017]
Franklin, Matthew; Haber, Stuart, Joint encryption and message-efficient secure computation, 266-277 [Zbl 0870.94027]
Blum, Avrim; Furst, Merrick; Kearns, Michael; Lipton, Richard J., Cryptographic primitives based on hard learning problems, 278-291 [Zbl 0870.94021]
Ferguson, Niels, Extensions of single-term coins, 292-301 [Zbl 1114.68411]
Brands, Stefan, Untraceable off-line cash in wallet with observers. (Extended abstract), 302-318 [Zbl 0878.68061]
Crépeau, Claude; Kilian, Joe, Discret solitary games, 319-330 [Zbl 0870.94024]
Bierbrauer, Jürgen; Johansson, Thomas; Kabatianskij, Gregory; Smeets, Ben, On families of hash functions via geometric codes and concatenation, 331-342 [Zbl 0870.94020]
Johansson, Thomas, On the construction of perfect authentication codes that permit arbitration, 343-354 [Zbl 0870.94030]
Gemmell, Pete; Naor, Moni, Codes for interactive authentication, 355-367 [Zbl 0870.94028]
Preneel, Bart; Govaerts, René; Vandewalle, Joos, Hash functions based on block ciphers: A synthetic approach, 368-378 [Zbl 0877.94039]
Hohl, Walter; Lai, Xuejia; Meier, Thomas; Waldvogel, Christian, Security of iterated hash functions based on block ciphers, 379-390 [Zbl 0870.94029]
Patarin, Jaques; Chauvaud, Pascal, Improved algorithms for the permuted kernel problem, 391-402 [Zbl 1126.94337]
O’Connor, Luke, On the distribution of characteristics in composite permutations, 403-412 [Zbl 0870.94034]
Li, Chuan-Ming; Hwang, Tzonelih; Lee, Narn-Yih, Remark on the threshold RSA signature scheme, 413-419 [Zbl 0870.94032]
Lim, Chae Hoon; Lee, Pil Joong, Another method for attaining security against adaptively chosen ciphertext attacks, 420-434 [Zbl 0870.94033]
Coppersmith, Don; Stern, Jacques; Vaudenay, Serge, Attacks on the birational permutation signature schemes, 435-443 [Zbl 0877.94030]
Beimel, Amos; Chor, Benny, Interaction in key distribution schemes. (Extended abstract), 444-455 [Zbl 0870.94023]
Leighton, Tom; Micali, Silvio, Secret-key agreement without public-key cryptography. (Extended abstract), 456-479 [Zbl 0870.94031]
Fiat, Amos; Naor, Moni, Broadcast encryption, 480-491 [Zbl 0870.94026]

MSC:
00B25 Proceedings of conferences of miscellaneous specific interest
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
68-06 Proceedings, conferences, collections, etc. pertaining to computer science
94A60 Cryptography
PDF BibTeX XML Cite