Advances in cryptology - EUROCRYPT '94. Workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994. Proceedings (Q1899994)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Advances in cryptology - EUROCRYPT '94. Workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994. Proceedings
scientific article

    Statements

    Advances in cryptology - EUROCRYPT '94. Workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994. Proceedings (English)
    0 references
    0 references
    16 October 1995
    0 references
    The articles of this volume will be reviewed individually. The preceding conference (1992) has been reviewed (see Zbl 0782.00086). Indexed articles: \textit{Naor, Moni; Shamir, Adi}, Visual cryptography, 1-12 [Zbl 0878.94048] \textit{Csirmaz, László}, The size of share must be large, 13-22 [Zbl 0885.94020] \textit{van Dijk, Marten}, A linear construction of perfect secret sharing schemes, 23-34 [Zbl 0909.94010] \textit{Blundo, C.; Gaggia, A. Giorgio; Stinson, D. R.}, On the dealer's randomness required in secret sharing schemes, 35-46 [Zbl 0885.94018] \textit{Schnorr, C. P.; Vaudenav, S.}, Black box cryptanalysis of hash networks based on multipermutations, 47-57 [Zbl 0909.94013] \textit{Joux, Antoine; Granboulan, Louis}, A practical attack against knapsack based hash functions. (Extended abstract), 58-66 [Zbl 0909.94012] \textit{Franklin, Matthew; Yung, Moti}, The blinding of weak signatures. (Extended abstract), 67-76 [Zbl 0881.94014] \textit{Naccache, David; M'Raïhi, David; Vaudenay, Serge; Raṗhaeli, Dan}, Can D.S.A. be improved? Complexity trade-offs with the digital signature standard, 77-85 [Zbl 0881.94016] \textit{Chaum, David}, Designated confirmer signatures, 86-91 [Zbl 0881.94013] \textit{Bellare, Mihir; Rogaway, Phillip}, Optimal asymmetric encryption, 92-111 [Zbl 0881.94010] \textit{Orton, Glenn}, A multiple-iterated trapdoor for dense compact knapsacks., 112-130 [Zbl 1126.94334] \textit{Chabaud, Florent}, On the security of some cryptosystems based on error-correcting codes, 131-139 [Zbl 0881.94018] \textit{Chen, L.; Damgård, I. B.; Pedersen, T. P.}, Parallel divertibility of proofs of knowledge. (Extended abstract), 140-155 [Zbl 0881.94017] \textit{D'Amiano, Stefano; Di Crescenzo, Giovanni}, Methodology for digital money based on general cryptographic tools, 156-170 [Zbl 0879.94034] \textit{Chen, L.; Pedersen, T. P.}, New group signature schemes. (Extended abstract), 171-181 [Zbl 0879.94027] \textit{Nyberg, Kaisa; Rueppel, Rainer A.}, Message recovery for signature schemes based on the discrete logarithm problem, 182-193 [Zbl 0879.94028] \textit{Li, Chuan-Ming; Hwang, Tzonelih; Lee, Narn-Yih}, Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders, 194-204 [Zbl 0881.94015] \textit{Meier, Willi; Staffelbach, Othmar}, The self-shrinking generator, 205-214 [Zbl 0881.94009] \textit{Goresky, Mark; Klapper, Andrew}, Feedback registers based on ramified extensions of the 2-adic numbers. (Extended abstract), 215-222 [Zbl 0879.94019] \textit{Göttfert, Rainer; Niederreiter, Harald}, A general lower bound for the linear complexity of the product of shift-register sequences, 223-229 [Zbl 0881.94008] \textit{Golić, Jovan Dj.; O'Connor, Luke}, Embedding and probabilistic correlation attacks on clock-controlled shift registers, 230-243 [Zbl 0879.94020] \textit{Taylor, Richard}, Near optimal unconditionally secure authentication, 244-253 [Zbl 0879.94029] \textit{Safavi-Naini, R.; Tombak, L.}, Authentication codes in plaintext and chosen-content attacks, 254-265 [Zbl 0885.94026] \textit{Cachin, Christian; Maurer, Ueli M.}, Linking information reconciliation and privacy amplification. (Extended abstract), 266-274 [Zbl 0879.94022] \textit{Burmester, Mike; Desmedt, Yvo}, A secure and efficient conference key distribution system. (Extended abstract), 275-286 [Zbl 0879.94021] \textit{Blundo, Carlo; Cresti, Antonella}, Space requirements for broadcast encryption, 287-298 [Zbl 0879.94030] \textit{Zheng, Yuliang}, How to break and repair Leighton and Micali's key agreement protocol, 299-305 [Zbl 0879.94032] \textit{Eng, Tony; Okamoto, Tatsuaki}, Single-term divisible electronic coins, 306-319 [Zbl 0879.94035] \textit{Syverson, Paul; Meadows, Catherine}, Formal requirements for key distribution protocols., 320-331 [Zbl 1126.94342] \textit{Pfitzmann, Birgit}, Breaking an efficient anonymous channel, 332-340 [Zbl 0879.94031] \textit{Biham, Eli}, On Matsui's linear cryptoanalysis, 341-355 [Zbl 0879.94025] \textit{Chabaud, Florent; Vaudenay, Serge}, Links between differential and linear cryptanalysis, 356-365 [Zbl 0879.94023] \textit{Matsui, Mitsuru}, On correlation between the order of S-boxes and the strength of DES, 366-375 [Zbl 0879.94024] \textit{Seberry, Jennifer; Zhang, Xiao-Mo; Zhang, Yuliang}, Relationship among nonlinearity criteria. (Extended abstract), 376-388 [Zbl 0909.94014] \textit{de Rooij, Peter}, Efficient exponentiation using precomputation and vector addition chains, 389-399 [Zbl 0879.94026] \textit{Damm, F.; Heider, F.-P.; Wambach, G.}, MIMD-factorisation on hypercubes, 400-409 [Zbl 0957.11053] \textit{Knudsen, Lars R.; Lai, Xuejia}, New attacks on all double block length hash functions of hash rate 1, including the Parallel-DM, 410-418 [Zbl 0885.94021] \textit{Knudsen, Lars Ramkilde}, New potentially `weak' keys for DES and LOKI. (Extended abstract), 419-424 [Zbl 0925.94090] \textit{Jakobsson, Markus}, Blackmailing using undeniable signatures, 425-427 [Zbl 0909.94011] \textit{Camenisch, Jan L.; Piveteau, Jean-Marc; Stadler, Markus A.}, Blind signatures based on the discrete logarithm problem, 428-432 [Zbl 0885.94019] \textit{Charnes, C.; O'Connor, L.; Pieprzyk, J.; Safavi-Naini, R.; Zheng, Y.}, Comments on Soviet encryption algorithm, 433-438 [Zbl 0879.94033] \textit{Nyberg, Kaisa}, Linear approximation of block ciphers, 439-444 [Zbl 0885.94023] \textit{Shamir, Adi}, Memory efficient variants of public-key schemes for smart card applications, 445-449 [Zbl 0885.94027] \textit{Menicocci, Renato}, A systematic attack on clock controlled cascades, 450-455 [Zbl 0885.94022] \textit{Johansson, Thomas; Smeets, Ben}, On \(A^ 2\)-codes including arbiter's attacks, 456-460 [Zbl 0888.94014] \textit{Biham, Eli; Biryukov, Alex}, An improvement of Davies' attack on DES, 461-467 [Zbl 0881.94011] \textit{Hruby, J.}, \(q\)-deformed quantum cryptography, 468-472 [Zbl 0881.94019]
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    Cryptology
    0 references
    EUROCRYPT
    0 references
    Cryptographic techniques
    0 references
    Perugia (Italy)
    0 references
    Proceedings
    0 references
    Workshop
    0 references
    0 references