Advances in Cryptology — EUROCRYPT'98: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31 – June 4, 1998 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '98, held in Espoo, Finland, in May/June 1998.
The book presents 44 revised full papers selected from a total of 161 submissions. The papers are organized in sections on distributed cryptography, complexity, cryptanalysis of block ciphers, computational algorithms, paradigms for symmetric systems, public key cryptosystems, multi-party computation, digital signatures, Boolean functions, combinatorial design and analysis, elliptic curve systems, and electronic commerce and payment.

Author(s): Victor Shoup, Rosario Gennaro (auth.), Kaisa Nyberg (eds.)
Series: Lecture Notes in Computer Science 1403
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1998

Language: English
Pages: 613
Tags: Data Encryption; Computer Communication Networks; Discrete Mathematics in Computer Science; Computers and Society; Computational Mathematics and Numerical Analysis

Securing threshold cryptosystems against chosen ciphertext attack....Pages 1-16
Auto-recoverable auto-certifiable cryptosystems....Pages 17-31
A practical and provably secure scheme for publicly verifiable secret sharing and its applications....Pages 32-46
Equivalence of counting the number of points on elliptic curve over the ring Zn and factoring n ....Pages 47-58
Breaking RSA may not be equivalent to factoring....Pages 59-71
Lower bounds on generic algorithms in groups....Pages 72-84
Improved cryptanalysis of RC5....Pages 85-99
Cryptanalysis of the ANSI X9.52 CBCM mode....Pages 100-111
Differential-linear weak key classes of IDEA....Pages 112-126
Divertible protocols and atomic proxy cryptography....Pages 127-144
Optimum traitor tracing and asymmetric schemes....Pages 145-157
On finding small solutions of modular multivariate polynomial equations....Pages 158-170
Computing discrete logarithms with quadratic number rings....Pages 171-183
Improved algorithms for isomorphisms of polynomials....Pages 184-200
Visual cryptanalysis....Pages 201-210
How to improve an exponentiation black-box....Pages 211-220
Speeding up discrete log and factoring based schemes via precomputations....Pages 221-235
Fast batch verification for modular exponentiation and digital signatures....Pages 236-250
A formal treatment of remotely keyed encryption....Pages 251-265
Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible....Pages 266-280
The chain & sum primitive and its applications to MACs and stream ciphers....Pages 281-293
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption....Pages 294-307
A new public-key cryptosystem as secure as factoring....Pages 308-318
Towards a better understanding of one-wayness: Facing linear permutations....Pages 319-333
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?....Pages 334-345
Secure communication in minimal connectivity models....Pages 346-360
On the foundations of oblivious transfer....Pages 361-374
Quorum-based secure multi-party computation....Pages 375-390
Strengthened security for blind signatures....Pages 391-405
Generic constructions for secure and efficient confirmer signature schemes....Pages 406-421
Security analysis of a practical “on the fly” authentication and signature generation....Pages 422-436
Universally verifiable mix-net with verification work independent of the number of mix-servers....Pages 437-447
A practical mix....Pages 448-461
On the propagation criterion of degree l and order k ....Pages 462-474
Highly nonlinear balanced Boolean functions with a good correlation-immunity....Pages 475-488
Heuristic design of cryptographically strong balanced Boolean functions....Pages 489-499
Secret sharing schemes with bipartite access structure....Pages 500-511
Combinatorial bounds for broadcast encryption....Pages 512-526
New results on multi-receiver authentication codes....Pages 527-541
Specialized integer factorization....Pages 542-545
Security of an identity-based cryptosystem and the related reductions....Pages 546-560
Easy come — Easy go divisible cash....Pages 561-575
Secure and efficient metering....Pages 576-590
Optimistic fair exchange of digital signatures....Pages 591-606