{"entities":{"Q1202159":{"pageid":1212908,"ns":120,"title":"Item:Q1202159","lastrevid":69876900,"modified":"2026-04-13T10:56:27Z","type":"item","id":"Q1202159","labels":{"en":{"language":"en","value":"Advances in cryptology - EUROCRYPT '91. Workshop on the theory and application of cryptographic techniques, Brighton, GB, April 8-11, 1991. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 108261"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1202159$7E45BA28-BEE2-41BA-983F-E5B0D7BB7B5E","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"aa135ce22de6b34e3fe4442e46d57f9a50ddedf1","datavalue":{"value":{"text":"Advances in cryptology - EUROCRYPT '91. Workshop on the theory and application of cryptographic techniques, Brighton, GB, April 8-11, 1991. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1202159$09FD081D-8387-4CD1-A2BB-D3C1EA9CCE97","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"9077ecfd809dd6e02c9fa8b59c89e471ab95291d","datavalue":{"value":"0756.00008","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1202159$2AE9B244-8286-4451-84DA-D583A1297E7E","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1202159$A4AB644C-1CEF-436D-BECD-B0A9BB7E8EEB","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"4f64992dbeef321276c91b04bb85fa175c4114d8","datavalue":{"value":{"time":"+1993-01-23T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1202159$C55C3883-44D1-4AF8-AE72-4B45ABC52F22","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"2c39554bda67f551575c7c70aa9b6ed69d1114ad","datavalue":{"value":"The articles of this volume will be reviewed individually.  Indexed articles:  \\textit{Biham, Eli; Shamir, Adi}, Differential cryptanalysis of Feal and \\(N\\)-Hash, 1-16 [Zbl 0777.94012]  \\textit{Lai, Xuejia; Massey, James L.; Murphy Sean}, Markov ciphers and differential cryptanalysis, 17-38 [Zbl 0777.94013]  \\textit{Camion, Paul; Patarin, Jacques}, The knapsack hash function proposed at Crypto'89 can be broken, 39-53 [Zbl 0789.68046]  \\textit{Coster, M. J.; LaMacchia, B. A.; Odlyzko, A. M.; Schnorr, C. P.}, An improved low-density subset sum algorithm, 54-67 [Zbl 0774.11075]  \\textit{Korzhik, Valery I.; Turkin, Andrey I.}, Cryptanalysis of McEliece's public-key cryptosystem, 68-70 [Zbl 0825.94181]  \\textit{de Rooij, Peter}, On the security of the Schnorr scheme using preprocessing, 71-80 [Zbl 0771.68048]  \\textit{Burmester, Mike; Desmedt, Yvo}, Broadcast interactive proofs, 81-95 [Zbl 0791.68043]  \\textit{Okamoto, Tatsuaki; Chaum, David; Ohta, Kazuo}, Direct zero knowledge proofs of computational power in five rounds, 96-105 [Zbl 0791.68050]  \\textit{Cr\u00e9peau, Claude; S\u00e1ntha, Mikl\u00f3s}, On the reversibility of oblivious transfer, 106-113 [Zbl 0791.68045]  \\textit{Mund, Sibylle}, Ziv-Lempel complexity for periodic sequences and its cryptographic application, 114-126 [Zbl 0766.94006]  \\textit{Habutsu, Toshiki; Nishio, Yoshifumi; Sasase, Iwao; Mori, Shinsaku}, A secret key cryptosystem by iterating a chaotic map, 127-140 [Zbl 0766.94011]  \\textit{Preneel, B.; Govaerts, Ren\u00e9; Vandewalle, Joos}, Boolean functions satisfying higher order propagation criteria, 141-152 [Zbl 0766.94015]  \\textit{Jansen, Cees J. A.}, The maximum order complexity of sequence ensembles, 153-159 [Zbl 0791.68077]  \\textit{Goli\u0107, Jovan Dj.}, The number of output sequences of a binary sequence generator, 160-167 [Zbl 0766.94004]  \\textit{Dai, Zong-Duo; Yang, Jun-Hui}, Linear complexity of periodically repeated random sequences, 168-175 [Zbl 0766.94003]  \\textit{Chepyzhov, Vladimir; Smeets, Ben}, On a fast correlation attack on certain stream ciphers, 176-185 [Zbl 0766.94002]  \\textit{Meier, Willi; Staffelbach, Othmar}, Analysis of pseudo random sequences generated by cellular automata, 186-199 [Zbl 0791.68121]  \\textit{Chambers, W. G.; Dai, Z. D.}, On binary sequences from recursions ``modulo \\(2^e\\)'' made non-linear by the bit-by-bit ``xor'' function, 200-204 [Zbl 0766.94001]  \\textit{Desmedt, Yvo; Yung, Moti}, Weaknesses of undeniable signature schemes, 205-220 [Zbl 0825.94197]  \\textit{Pedersen, Torben Pryds}, Distributed provers with applications to undeniable signatures, 221-242 [Zbl 0791.68051]  \\textit{Fujioka, Atsushi; Okamoto, Tatsuaki; Ohta, Kazuo}, Interactive bi-proof systems and undeniable signature schemes, 243-256 [Zbl 0791.68046]  \\textit{Chaum, David; van Heyst, Eug\u00e8ne}, Group signatures, 257-265 [Zbl 0791.68044]  \\textit{Boyd, Colin}, Enhancing secrecy by data compression: theoretical and practical aspects, 266-280 [Zbl 0825.94149]  \\textit{Schnorr, C. P.}, Factoring integers and computing discrete logarithms via diophantine approximation, 281-293 [Zbl 0772.11045]  \\textit{Huber, Klaus}, Some considerations concerning the selection of RSA moduli, 294-301 [Zbl 0772.94006]  \\textit{Portz, Michael}, On the use of interconnection networks in cryptography, 302-315 [Zbl 0791.68006]  \\textit{Beth, T.; Schaefer, F.}, Non supersingular elliptic curves for public key cryptosystems, 316-327 [Zbl 0766.94008]  \\textit{Morain, Fran\u00e7ois}, Building cyclic elliptic curves modulo large primes, 328-336 [Zbl 0773.14018]  \\textit{Shizuya, Hiroki; Itoh, Toshiya; Sakurai, Kouichi}, On the complexity of hyperelliptic discrete logarithm problem, 337-351 [Zbl 0791.68081]  \\textit{Dawson, M. H.; Tavares, S. E.}, An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks, 352-367 [Zbl 0825.94199]  \\textit{O'Connor, Luke}, Enumerating nondegenerate permutations, 368-377 [Zbl 0766.94013]  \\textit{Nyberg, Kaisa}, Perfect nonlinear S-boxes, 378-386 [Zbl 0766.94012]  \\textit{Rueppel, Rainer A.}, A formal approach to security architectures, 387-398 [Zbl 0791.68097]  \\textit{Horster, Patrick; Knobloch, Hans-Joachim}, Discrete logarithm based protocols, 399-408 [Zbl 0791.68004]  \\textit{Matsumoto, Tsutomu; Imai, Hideki}, Human identification through insecure channel, 409-421 [Zbl 0791.68048]  \\textit{Sadeghiyan, Babak; Pieprzyk, Josef}, A construction for one-way hash functions and pseudorandom bit generators, 431-445 [Zbl 0791.68053]  \\textit{Fujioka, Atsushi; Okamoto, Tatsuaki; Miyaguchi, Shoji}, ESIGN: An efficient digital signature implementation for smart cards, 446-457 [Zbl 0825.94184]  \\textit{Maurer, Ueli M.}, New approaches to the design of self-synchronizing stream ciphers, 458-471 [Zbl 0766.94005]  \\textit{Pieprzyk, Josef; Safavi-Naini, Reihaneh}, Randomized authentication systems, 472-481 [Zbl 0791.68052]  \\textit{Gabidulin, E. M.; Paramonov, A. V.; Tretjakov, O. V.}, Ideals over a non-commutative ring and their application in cryptology, 482-489 [Zbl 0766.94009]  \\textit{Girault, Marc}, Self-certified public keys, 490-497 [Zbl 0825.68374]  \\textit{Maurer, Ueli M.; Yacobi, Yacov}, Non-interactive public-key cryptography, 498-507 [Zbl 0825.94189]  \\textit{Z\u00e9mor, G.}, Hash functions and graphs with large girths, 508-511 [Zbl 0791.68055]  \\textit{M\u00fcller, Winfried B.; Oswald, Alan}, Dickson pseudoprimes and primality testing, 512-516 [Zbl 0783.11045]  \\textit{Gibson, J. K.}, Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem, 517-521 [Zbl 0766.94010]  \\textit{Pedersen, Torben Pryds}, A threshold cryptosystem without a trusted party. (Extended abstract), 522-526 [Zbl 0766.94014]  \\textit{Mihaljevi\u0107, Miodrag J.; Goli\u0107, Jovan Dj.}, A comparison of cryptoanalytic principles based on iterative error- correction, 527-531 [Zbl 0825.94172]  \\textit{Biham, Eli}, Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT'91, 532-534 [Zbl 0825.94182]  \\textit{Berkovits, Shimshon}, How to broadcast a secret, 535-541 [Zbl 0766.94007]  \\textit{Pieprzyk, Josef}, Probabilistic analysis of elementary randomizers, 541-546 [Zbl 0766.60004]  \\textit{Brynielsson, Lennart}, The information leakage through a randomly generated function, 552-556 [Zbl 0825.94194]","type":"string"},"datatype":"string"},"type":"statement","id":"Q1202159$F886847C-8719-461A-B7EA-2BB1EE246B5C","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1202159$B5CDAE37-072A-458A-B0A6-E264803BC8B1","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1202159$4DA9B1C4-0340-4E03-B173-4305BD2FBF58","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1202159$B0726BE4-A941-4CD3-BA9A-D31876EC1C6A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1202159$6BC01865-480E-4101-8136-DDD19BE18D34","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1202159$FC0E8871-6749-42A2-9D7D-F75FD52F9B77","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"730a1a27584fa66055597270798df52edf8cdb10","datavalue":{"value":"108261","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1202159$7950B2D2-78D9-4CD1-8A9B-61ADD8EA38FD","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"e187db0610457eed291ae7e6368461753786d2f6","datavalue":{"value":"Brighton (GB)","type":"string"},"datatype":"string"},"type":"statement","id":"Q1202159$7E12F3A2-2159-4D92-896E-BF3212D84A66","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"0c0f1dc65b37178492322f13cff38277cdd895df","datavalue":{"value":"EUROCRYPT '91","type":"string"},"datatype":"string"},"type":"statement","id":"Q1202159$A55CB826-5B61-4B2C-8848-F275C84D2BF3","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9444c7e81fc487ab48d60d555be7e74462154789","datavalue":{"value":"Cryptology","type":"string"},"datatype":"string"},"type":"statement","id":"Q1202159$D9192D13-6B35-4CE8-91C0-E714DD953A23","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"f7c2172f0a2ed6197400daa3f44dae0d79725b1a","datavalue":{"value":"Workshop","type":"string"},"datatype":"string"},"type":"statement","id":"Q1202159$A2E9A15B-1415-4311-9FD6-DF56965AACE6","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q1202159$81B6EDEE-D352-4F6F-AD6B-559B5C9BD6B2","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1202159$14538741-3579-41E8-8E99-9641B81FD245","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Advances in cryptology - EUROCRYPT '91. Workshop on the theory and application of cryptographic techniques, Brighton, GB, April 8-11, 1991. Proceedings","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Advances_in_cryptology_-_EUROCRYPT_%2791._Workshop_on_the_theory_and_application_of_cryptographic_techniques,_Brighton,_GB,_April_8-11,_1991._Proceedings"}}}}}