Advances in Cryptology — EUROCRYPT ’93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23–27, 1993 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Eurocrypt is a series of open workshops on the theory and application of cryptographic techniques. These meetings have taken place in Europe every year since 1982 and are sponsored by the International Association for Cryptologic Research. Eurocrypt '93 was held in the village of Lofthus in Norway in May 1993. The call for papers resulted in 117 submissions with authors representing 27 different countries. The 36 accepted papers were selected by the program committee after a blind refereeing process. The papers are grouped into parts on authentication, public key, block ciphers, secret sharing, stream ciphers, digital signatures, protocols, hash functions, payment systems, and cryptanalysis. The volume includes 6 further rump session papers.

Author(s): Thomas Johansson, Gregory Kabatianskii, Ben Smeets (auth.), Tor Helleseth (eds.)
Series: Lecture Notes in Computer Science 765
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1994

Language: English
Pages: 465
Tags: Data Encryption; Coding and Information Theory; Database Management; Combinatorics; Operating Systems

On the Relation Between A-Codes and Codes Correcting Independent Errors....Pages 1-11
Optimal Authentication Systems....Pages 12-27
Factoring Integers Using SIMD Sieves....Pages 28-39
A New Elliptic Curve Based Analogue of RSA....Pages 40-49
Weaknesses of a public-key cryptosystem based on factorizations of finite groups....Pages 50-54
Differentially uniform mappings for cryptography....Pages 55-64
On Almost Perfect Nonlinear Permutations....Pages 65-76
Two New Classes of Bent Functions....Pages 77-101
Boolean functions satisfying a higher order strict avalanche criterion....Pages 102-117
Size of Shares and Probability of Cheating in Threshold Schemes....Pages 118-125
Nonperfect Secret Sharing Schemes and Matroids....Pages 126-141
From the memoirs of a Norwegian cryptologist....Pages 142-150
On the Linear Complexity of Products of Shift-Register Sequences....Pages 151-158
Resynchronization Weaknesses in Synchronous Stream Ciphers....Pages 159-167
Blind Synchronization of m-Sequences with Even Span....Pages 168-180
On Constructions and Nonlinearity of Correlation Immune Functions....Pages 181-199
Practical and Provably Secure Release of a Secret and Exchange of Signatures....Pages 200-217
Subliminal Communication is Easy Using the DSA....Pages 218-232
Can O.S.S. be Repaired? - Proposal for a New Practical Signature Scheme -....Pages 233-239
On a Limitation of BAN Logic....Pages 240-247
Efficient Anonymous Channel and All/Nothing Election Scheme....Pages 248-259
Untransferable Rights in a Client-Independent Server Environment....Pages 260-266
Interactive Hashing Simplifies Zero-Knowledge Protocol Design....Pages 267-273
One-Way Accumulators: A Decentralized Alternative to Digital Signatures....Pages 274-285
The breaking of the AR Hash Function....Pages 286-292
Collisions for the compression function of MD5....Pages 293-304
How to Find and Avoid Collisions for the Knapsack Hash Function....Pages 305-317
Single Term Off-Line Coins....Pages 318-328
Improved Privacy in Wallets with Observers....Pages 329-343
Distance-Bounding Protocols....Pages 344-359
On the Distribution of Characteristics in Bijective Mappings....Pages 360-370
On the Security of the IDEA Block Cipher....Pages 371-385
Linear Cryptanalysis Method for DES Cipher....Pages 386-397
New Types of Cryptanalytic Attacks Using Related Keys....Pages 398-409
Secret-Key Reconciliation by Public Discussion....Pages 410-423
Global, Unpredictable Bit Generation Without Broadcast....Pages 424-434
On Schnorr’s Preprocessing for Digital Signature Schemes....Pages 435-439
Cryptanalysis of the Chang-Wu-Chen key distribution system....Pages 440-442
An Alternate Explanation of two BAN-logic “failures”....Pages 443-447
The Consequences of Trust in Shared Secret Schemes....Pages 448-452
Markov Ciphers and Alternating Groups....Pages 453-460
On Key Distribution and Authentication in Mobile Radio Networks....Pages 461-465