Advances in cryptology - CRYPTO '93. 13th annual international cryptology conference, Santa Barbara, CA, USA, August 22 - 26, 1993. Proceedings (Q1317219)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Advances in cryptology - CRYPTO '93. 13th annual international cryptology conference, Santa Barbara, CA, USA, August 22 - 26, 1993. Proceedings |
scientific article |
Statements
Advances in cryptology - CRYPTO '93. 13th annual international cryptology conference, Santa Barbara, CA, USA, August 22 - 26, 1993. Proceedings (English)
0 references
14 March 1994
0 references
The articles of this volume will be reviewed individually. The preceding conference (12, 1992) has been reviewed (see Zbl 0803.00037). Indexed articles: \textit{Shamir, Adi}, Efficient signature schemes based on birational permutations, 1-12 [Zbl 0877.94041] \textit{Stern, Jacques}, A new identification scheme based on syndrome decoding, 13-21 [Zbl 0876.94035] \textit{Coppersmith, Don; Krawczyk, Hugo; Mansour, Yishay}, The shrinking generator, 22-39 [Zbl 0871.94018] \textit{Taylor, Richard}, An integrity check value algorithm for stream ciphers, 40-48 [Zbl 0871.94042] \textit{Seberry, Jennifer; Zhang, Xian-Mo; Zheng, Yuliang}, Nonlinearly balanced boolean functions and their propagation characteristics. (Extended abstract), 49-60 [Zbl 0870.94035] \textit{Itoh, Toshiya; Hoshi, Masafumi; Tsujii, Shigeo}, A low communication competitive interactive proof system for promised quadratic residuosity, 61-72 [Zbl 0871.94031] \textit{De Santis, Alfredo; Di Crescenzo, Giovanni; Persiano, Giuseppe}, Secret sharing and perfect zero knowledge, 73-84 [Zbl 0870.94025] \textit{Aumann, Yonatan; Feige, Uriel}, One message proof systems with known space verifiers, 85-99 [Zbl 0877.94027] \textit{Damgård, Ivan B.}, Interactive hashing can simplify zero-knowledge protocol design without computational assumptions. (Extended abstract), 100-109 [Zbl 1126.94327] \textit{Blundo, Carlo; Cresti, Antonella; De Santis, Alfredo; Vaccaro, Ugo}, Fully dynamic secret sharing schemes, 110-125 [Zbl 0870.94022] \textit{Jackson, Wen-Ai; Martin, Keith M.; O'Keefe, Christine M.}, Multisecret threshold schemes, 126-135 [Zbl 0871.94032] \textit{Krawczyk, Hugo}, Secret sharing made short, 136-146 [Zbl 0871.94034] \textit{Adleman, Leonard M.; DeMarrais, Jonathan}, A subexponential algorithm for discrete logarithms over all finite fields, 147-158 [Zbl 0871.11094] \textit{Buchmann, J.; Loho, J.; Zayer, J.}, An implementation of the general number field sieve. (Extended abstract), 159-165 [Zbl 0871.11092] \textit{Denny, T.; Dodson, B.; Lenstra, A. K.; Manasse, M. S.}, On the factorization of RSA-120, 166-174 [Zbl 0870.11078] \textit{Bosselaers, Antoon; Govaerts, René; Vandewalle, Joos}, Comparison of three modular reduction functions, 175-186 [Zbl 0871.94026] \textit{Ben-Aroya, Ishai; Biham, Eli}, Differential cryptanalysis of Lucifer, 187-199 [Zbl 0871.94024] \textit{Ohta, Kazuo; Matsui, Mitsuru}, Differential attack on message authentication codes, 200-211 [Zbl 0871.94037] \textit{Preneel, Bart; Nuttin, Marnix; Rijmen, Vincent; Buelens, Johan}, Cryptanalysis of the CFB mode of the DES with a reduced number of rounds, 212-223 [Zbl 0871.94040] \textit{Daemen, Joan; Govaerts, René; Vandewalle, Joos}, Weak keys for IDEA, 224-231 [Zbl 0877.94031] \textit{Bellare, Mihir; Rogaway, Phillip}, Entity authentication and key distribution, 232-249 [Zbl 0870.94019] \textit{Damgård, Ivan B.; Pedersen, Torben P.; Pfitzmann, Birgit}, On the existence of statistically hiding bit commitment schemes and fail-stop signatures, 250-265 [Zbl 0873.94017] \textit{Franklin, Matthew; Haber, Stuart}, Joint encryption and message-efficient secure computation, 266-277 [Zbl 0870.94027] \textit{Blum, Avrim; Furst, Merrick; Kearns, Michael; Lipton, Richard J.}, Cryptographic primitives based on hard learning problems, 278-291 [Zbl 0870.94021] \textit{Ferguson, Niels}, Extensions of single-term coins, 292-301 [Zbl 1114.68411] \textit{Brands, Stefan}, Untraceable off-line cash in wallet with observers. (Extended abstract), 302-318 [Zbl 0878.68061] \textit{Crépeau, Claude; Kilian, Joe}, Discret solitary games, 319-330 [Zbl 0870.94024] \textit{Bierbrauer, Jürgen; Johansson, Thomas; Kabatianskij, Gregory; Smeets, Ben}, On families of hash functions via geometric codes and concatenation, 331-342 [Zbl 0870.94020] \textit{Johansson, Thomas}, On the construction of perfect authentication codes that permit arbitration, 343-354 [Zbl 0870.94030] \textit{Gemmell, Pete; Naor, Moni}, Codes for interactive authentication, 355-367 [Zbl 0870.94028] \textit{Preneel, Bart; Govaerts, René; Vandewalle, Joos}, Hash functions based on block ciphers: A synthetic approach, 368-378 [Zbl 0877.94039] \textit{Hohl, Walter; Lai, Xuejia; Meier, Thomas; Waldvogel, Christian}, Security of iterated hash functions based on block ciphers, 379-390 [Zbl 0870.94029] \textit{Patarin, Jaques; Chauvaud, Pascal}, Improved algorithms for the permuted kernel problem, 391-402 [Zbl 1126.94337] \textit{O'Connor, Luke}, On the distribution of characteristics in composite permutations, 403-412 [Zbl 0870.94034] \textit{Li, Chuan-Ming; Hwang, Tzonelih; Lee, Narn-Yih}, Remark on the threshold RSA signature scheme, 413-419 [Zbl 0870.94032] \textit{Lim, Chae Hoon; Lee, Pil Joong}, Another method for attaining security against adaptively chosen ciphertext attacks, 420-434 [Zbl 0870.94033] \textit{Coppersmith, Don; Stern, Jacques; Vaudenay, Serge}, Attacks on the birational permutation signature schemes, 435-443 [Zbl 0877.94030] \textit{Beimel, Amos; Chor, Benny}, Interaction in key distribution schemes. (Extended abstract), 444-455 [Zbl 0870.94023] \textit{Leighton, Tom; Micali, Silvio}, Secret-key agreement without public-key cryptography. (Extended abstract), 456-479 [Zbl 0870.94031] \textit{Fiat, Amos; Naor, Moni}, Broadcast encryption, 480-491 [Zbl 0870.94026]
0 references
Santa Barbara, CA, (USA)
0 references
Conference
0 references
Proceedings
0 references
CRYPTO '93
0 references
Cryptology
0 references