Advances in cryptology EUROCRYPT '97 : International Conference on the Theory and Application of Cryptographi
Author: EUROCRYPT '97 (1997 : Konstanz, Germany), Fumy, Walter, International Association for Cryptologic Research
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Computers, Cryptography, protocole, clé accès, authentification, sécurité informatique, signature numérique, cryptographie, Cryptographie, Ordinateurs, Geheimschrift, Computabilidade e modelos de computacao, Geheimschrift, Computabilidade e modelos de computacao, Ordinateurs, Cryptographie
Publishers: Berlin ; New York : Springer
Collections: journals contributions, journals
ISBN Number: 3540629750, 9783540629757
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 328.14 MB
PDF Size: 31.1 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 517
Views: 567
Total Files: 18
Media Type: texts
Total Files: 5
Last Modified: 2023-05-26 03:14:08
Size: 16.94 KB
Description
Author: Walter Fumy
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-62975-7
DOI: 10.1007/3-540-69053-0
Table of Contents:
- Two Attacks on Reduced IDEA
- Combinatorial Properties of Basic Encryption Operations
- A New Public-Key Cryptosystem
- On the Importance of Checking Cryptographic Protocols for Faults
- Lattice Attacks on NTRU
- Kleptography: Using Cryptography Against Cryptography
- Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation
- Anonymous Fingerprinting
- A Secure and Optimally Efficient Multi-Authority Election Scheme
- Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals
- The GCHQ Protocol and Its Problems
- Bucket Hashing with a Small Key Size
- A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost
- Smooth Entropy and Rényi Entropy
- Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion
- Linear Statistical Weakness of Alleged RC4 Keystream Generator
- Cryptanalysis of Alleged A5 Stream Cipher
- Lower Bounds for Discrete Logarithms and Related Problems
- Stronger Security Proofs for RSA and Rabin Bits
- Round-Optimal Zero-Knowledge Arguments Based on Any One-Way Function
"Sponsored by the International Association for Cryptologic Research (IACR)"--Page [vii]
Includes bibliographical references and index
Two Attacks on Reduced IDEA / Johan Borst, Lars R. Knudsen and Vincent Rijmen -- Combinatorial Properties of Basic Encryption Operations / Thilo Zieschang -- A New Public-Key Cryptosystem / David Naccache and Jacques Stern -- On the Importance of Checking Cryptographic Protocols for Faults / Dan Boneh, Richard A. DeMillo and Richard J. Lipton -- Lattice Attacks on NTRU / Don Coppersmith and Adi Shamir -- Kleptography: Using Cryptography Against Cryptography / Adam Young and Moti Yung -- Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation / Ronald Cramer and Ivan Damgard -- Anonymous Fingerprinting / Birgit Pfitzmann and Michael Waidner -- A Secure and Optimally Efficient Multi-Authority Election Scheme / Ronald Cramer, Rosario Gennaro and Berry Schoenmakers -- Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals / Eric R. Verheul and Henk C.A. van Tilborg -- The GCHQ Protocol and Its Problems / Ross Anderson and Michael Roe
Sponsored by the International Association for Cryptologic Research