Advances in Cryptology — AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques Gold Coast, Queensland, Australia, December 13–16, 1992 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.

Author(s): Yvo Desmedt (auth.), Jennifer Seberry, Yuliang Zheng (eds.)
Series: Lecture Notes in Computer Science 718
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1993

Language: English
Pages: 444
City: Berlin; New York
Tags: Data Encryption; Coding and Information Theory; Operating Systems; Combinatorics; Computer Communication Networks

Threshold cryptosystems....Pages 1-14
Authentication codes with perfect protection....Pages 15-26
Practical proven secure authentication with arbitration....Pages 27-32
Authentication codes under impersonation attack....Pages 33-47
Cumulative arrays and geometric secret sharing schemes....Pages 48-55
Nonperfect secret sharing schemes....Pages 56-66
A construction of practical secret sharing schemes using linear block codes....Pages 67-79
HAVAL — A one-way hashing algorithm with variable length of output (extended abstract)....Pages 81-104
On the power of memory in the design of collision resistant hash functions....Pages 105-121
A practical digital multisignature scheme based on discrete logarithms (extended abstract)....Pages 122-132
Group-oriented undeniable signature schemes without the assistance of a mutually trusted party....Pages 133-142
Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract)....Pages 143-155
Linear nonequivalence versus nonlinearity....Pages 156-164
Constructing large cryptographically strong S-boxes....Pages 165-181
Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept....Pages 183-195
Cryptanalysis of LOKI 91....Pages 196-208
Cryptanalysis of summation generator....Pages 209-215
Secure addition sequence and its applications on the server-aided secret computation protocols....Pages 217-230
Subliminal channels for signature transfer and their application to signature distribution schemes....Pages 231-243
A practical secret voting scheme for large scale elections....Pages 244-251
Privacy for multi-party protocols....Pages 252-260
New protocols for electronic money....Pages 261-274
Modelling and analyzing cryptographic protocols using Petri nets....Pages 275-295
On verifiable implicit asking protocols for RSA computation....Pages 296-307
Modified Maurer-Yacobi's scheme and its applications....Pages 308-323
The vulnerability of geometric sequences based on fields of odd characteristic....Pages 325-338
A fast cryptographic checksum algorithm based on stream ciphers....Pages 339-348
An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure....Pages 349-356
Construction of m -ary de Bruijn sequences (extended abstract)....Pages 357-363
Information technology security standards — An Australian perspective....Pages 365-384
Non-interactive generation of shared pseudorandom sequences....Pages 385-396
A generalized description of DES-based and Benes-based permutationgenerators....Pages 397-409
Prime generation with the Demytko-Miller-Trbovich algorithm....Pages 411-421
Constructions of feebly-one-way families of permutations....Pages 422-434
On bit correlations among preimages of “Many to one” One-way functions....Pages 435-446
The fast cascade exponentiation algorithm and its applications on cryptography....Pages 447-456
The design of a conference key distribution system....Pages 457-466
Remarks on “The design of a Conference Key Distribution System”....Pages 467-468
Public-key cryptosystem based on the discrete logarithm problem....Pages 469-476
Elliptic curves over F p suitable for cryptosystems....Pages 477-491
The probability Distribution of the Diffie-Hellman Key....Pages 492-504
A modular exponentiation unit based on systolic arrays....Pages 505-516
A comparison of key distribution patterns constructed from circle geometries....Pages 517-527
A block cipher method using combinations of different methods under the control of the user key....Pages 529-534
An attack on two hash functions by Zheng-Matsumoto-Imai....Pages 535-538
Primality testing with Lucas functions....Pages 539-542