This book contains the proceedings of the EUROCRYPT '88 conference, a workshop on theory and applications of cryptographic techniques held at Davos, Switzerland, May 25-27, 1988. The International Association for Cryptologic Research (IACR) organizes two international conferences every year, one in Europe and one in the United States. EUROCRYPT '88 was the sixth European conference. The number of contributions and of participants at the meetinng has increased substantially, which shows the high interest in cryptography and in system security in general. The interest has also further moved towards authentication, signatures and other protocols. This is to understand in view of the urgent needs for such protocols, in particular in connection with open information systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, i.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems, was however also well represented and several significant results were communicated. These proceedings contain all contributions accepted for presentation.
Author(s): Rainer A. Rueppel (auth.), D. Barstow, W. Brauer, P. Brinch Hansen, D. Gries, D. Luckham, C. Moler, A. Pnueli, G. Seegmüller, J. Stoer, N. Wirth, Christoph G. Günther (eds.)
Series: Lecture Notes in Computer Science 330
Publisher: Springer Berlin Heidelberg
Year: 1988
Language: English
Pages: 436
Tags: Data Encryption
Key Agreements Based on Function Composition....Pages 3-10
Security of Improved Identity-based Conference Key Distribution Systems....Pages 11-19
Subliminal-free Authentication and Signature....Pages 23-33
Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts....Pages 35-49
Authentication Codes with Multiple Arbiters....Pages 51-55
Some Constructions for Authentication - Secrecy Codes....Pages 57-75
Efficient Zero-Knowledge Identification Scheme for Smart Cards....Pages 77-84
A Smart Card Implementation of the Fiat-Shamir Identification Scheme....Pages 87-95
Manipulations and Errors, Detection and Localization....Pages 97-106
Privacy Protected Payments — Realization of a Protocol That Guarantees Payer Anonymity....Pages 107-122
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory....Pages 123-128
A Generalized Birthday Attack....Pages 129-156
An Interactive Data Exchange Protocol Based on Discrete Exponentiation....Pages 159-166
Anonymous and Verifiable Registration in Databases....Pages 167-176
Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA....Pages 177-182
Passports and Visas Versus IDs....Pages 183-188
The Probabilistic Theory of Linear Complexity....Pages 191-209
A Probabilistic Primality Test Based on the Properties of Certain Generalized Lucas Numbers....Pages 211-223
On the Construction of Random Number Generators and Random Function Generators....Pages 225-232
Factorization of Large Integers on a Massively Parallel Computer....Pages 235-243
A Fast Modular Arithmetic Algorithm Using a Residue Table....Pages 245-250
Fast Exponentiation in GF (2 n )....Pages 251-255
Fast RSA-Hardware: Dream or Reality?....Pages 257-264
Properties of the Euler Totient Function Modulo 24 and Some of Its Cryptographic Implications....Pages 267-274
An Observation on the Security of McEliece’s Public-Key Cryptosystem....Pages 275-280
How to Break Okamoto’s Cryptosystem by Reducing Lattice Bases....Pages 281-291
Cryptanalysis of F.E.A.L.....Pages 293-299
Fast Correlation Attacks on Stream Ciphers....Pages 301-314
A New Class of Nonlinear Functions for Running-key Generators....Pages 317-324
Windmill Generators A generalization and an observation of how many there are....Pages 325-330
Lock-in Effect in Cascades of Clock-Controlled Shift-Registers....Pages 331-343
Proof of Massey’s Conjectured Algorithm....Pages 345-349
Linear Recurring m-Arrays....Pages 351-357
Substantial Number of Cryptographic Keys and Its Application to Encryption Designs....Pages 361-373
A Measure of Semiequivocation....Pages 375-387
Some New Classes of Geometric Threshold Schemes....Pages 389-401
A Universal Algorithm for Homophonic Coding....Pages 405-414
A New Probabilistic Encryption Scheme....Pages 415-418
Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption....Pages 419-453
Some Applications of Multiple Key Ciphers....Pages 455-467