Advances in cryptology - CRYPTO '94. 14th annual international cryptology conference, Santa Barbara, CA, USA, August 21-25, 1994. Proceedings (Q1331629)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Advances in cryptology - CRYPTO '94. 14th annual international cryptology conference, Santa Barbara, CA, USA, August 21-25, 1994. Proceedings |
scientific article |
Statements
Advances in cryptology - CRYPTO '94. 14th annual international cryptology conference, Santa Barbara, CA, USA, August 21-25, 1994. Proceedings (English)
0 references
22 August 1994
0 references
The articles of this volume will be reviewed individually. The 13th conference (1992) has been announced (see Zbl 0856.00053). Indexed articles: \textit{Matsui, Mitsuru}, The first experimental cryptanalysis of the Data Encryption Standard, 1-11 [Zbl 0939.94551] \textit{Ohta, Kazuo; Aoki, Kazumaro}, Linear cryptanalysis of the Fast Data Encipherment Algorithm, 12-16 [Zbl 0939.94533] \textit{Langford, Susan K.; Hellman, Martin E.}, Differential-linear cryptanalysis, 17-25 [Zbl 0939.94524] \textit{Kaliski, Burton S. jun.; Robshaw, M. J. B.}, Linear cryptanalysis using multiple approximations, 26-39 [Zbl 0939.94534] \textit{Tillich, Jean-Pierre; Zémor, Gilles}, Hashing with \(\mathrm{SL}_2\), 40-49 [Zbl 0939.94527] \textit{Chao, Jinhui; Tanada, Kazuo; Tsujii, Shigeo}, Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks, 50-55 [Zbl 0939.94561] \textit{Biehl, Ingrid; Buchmann, Johannes; Thiel, Christoph}, Cryptographic protocols based on discrete logarithms in real-quadratic orders, 56-60 [Zbl 0939.94520] \textit{Okamoto, Tatsuaki}, Designated confirmer signatures and public-key encryption are equivalent, 61-74 [Zbl 0939.94522] \textit{Bleichenbacher, Daniel; Maurer, Ueli M.}, Directed acyclic graphs, one-way functions and digital signatures, 75-82 [Zbl 0939.94525] \textit{Delos, Olivier; Quisquater, Jean-Jacques}, An indentity-based signature scheme with bounded life-span, 83-94 [Zbl 0939.94510] \textit{Lim, Chae Hoon; Lee, Pil Joong}, More flexible exponentiation with precomputation, 95-107 [Zbl 0939.94537] \textit{Horváth, Tamás; Magliveras, Spyros S.; van Trung, Tran}, A parallel permutation multiplier for a PGM crypto-chip, 108-113 [Zbl 0939.94506] \textit{Davis, Don; Ihaka, Ross; Fenstermacher, Philip}, Cryptographic randomness from air turbulence in disk drives, 114-120 [Zbl 0939.94521] \textit{Gehrmann, Christian}, Cryptanalysis of the Gemmell and Naor multiround authentication protocol, 121-128 [Zbl 0939.94519] \textit{Krawczyk, Hugo}, LFSR-based hashing and authentication, 129-139 [Zbl 0939.94567] \textit{Kurosawa, Kaoru}, New bound on authentication code with arbitration, 140-149 [Zbl 0939.94568] \textit{Blundo, Carlo; De Santis, Alfredo; Di Crescenzo, Giovanni; Gaggia, Antonio Giorgio; Vaccaro, Ugo}, Multi-secret sharing schemes, 150-163 [Zbl 0939.94538] \textit{Stern, Jacques}, Designing identification schemes with keys of short size, 164-173 [Zbl 0939.94523] \textit{Cramer, Ronald; Damgård, Ivan; Schoenmakers, Berry}, Proofs of partial knowledge and simplified design of witness hiding protocols, 174-187 [Zbl 0939.94546] \textit{Itoh, Toshiya; Ohta, Yuji; Shizuya, Hiroki}, Language dependent secure bit commitment, 188-201 [Zbl 0939.94531] \textit{Girault, Marc; Stern, Jacques}, On the length of cryptographic hash-values used in identification schemes, 202-215 [Zbl 0939.94541] \textit{Bellare, Mihir; Goldreich, Oded; Goldwasser, Shafi}, Incremental cryptography: The case of hashing and signing, 216-233 [Zbl 0939.94530] \textit{Dwork, Cynthia; Naor, Moni}, An efficient existentially unforgeable signature scheme and its applications, 234-246 [Zbl 0939.94509] \textit{Bierbrauer, Jürgen; Gopalakrishnan, K.; Stinson, D. R.}, Bounds for resilient functions and orthogonal arrays, 247-256 [Zbl 0939.94513] \textit{Chor, Benny; Fiat, Amos; Naor, Moni}, Tracing traitors, 257-270 [Zbl 0939.94555] \textit{Maurer, Ueli M.}, Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms, 271-281 [Zbl 0939.94564] \textit{Mihailescu, Preda}, Fast generation of provable primes using search in arithmetic progressions, 282-293 [Zbl 0939.94526] \textit{Coppersmith, Don}, Attack on the cryptographic scheme NIKS-TAS, 294-307 [Zbl 0939.94511] \textit{Burmester, Mike}, On the risk of opening distributed keys, 308-317 [Zbl 0939.94543] \textit{Beth, Th.; Lazic, D. E.; Mathias, A.}, Cryptanalysis of cryptosystems based on remote chaos replication, 318-331 [Zbl 0939.94517] \textit{Massey, James L.; Serconek, Shirlei}, A Fourier transform approach to the linear complexity of nonlinearly filtered sequences, 332-340 [Zbl 0939.94562] \textit{Bellare, Mihir; Kilian, Joe; Rogaway, Phillip}, The security of cipher block chaining, 341-358 [Zbl 0939.94554] \textit{Gilbert, Henri; Chauvaud, Pascal}, A chosen plaintext attack of the 16-round Khufu cryptosystem, 359-368 [Zbl 0939.94504] \textit{Tsunoo, Yukiyasu; Okamoto, Eiji; Uyematsu, Tomohiko}, Ciphertext only attack for one-way function of the MAP using one ciphertext, 369-382 [Zbl 0939.94514] \textit{Seberry, Jennifer; Zhang, Xian-Mo; Zheng, Yuliang}, Pitfalls in designing substitution boxes, 383-396 [Zbl 0939.94545] \textit{Kushilevitz, Eyal; Rosén, Adi}, A randomness-rounds tradeoff in private computation, 397-410 [Zbl 0939.94507] \textit{Sako, Kazue; Kilian, Joe}, Secure voting using partially compatible homomorphisms, 411-424 [Zbl 0939.94569] \textit{Canetti, Ran; Herzberg, Amir}, Maintaining security in the presence of transient faults, 425-438 [Zbl 0939.94536]
0 references
Santa Barbara, CA (USA)
0 references
Conference
0 references
Proceedings
0 references
CRYPTO '94
0 references
Cryptology
0 references