Advances in Cryptology — CRYPTO ’94 [electronic resource] : 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings / edited by Yvo G. Desmedt.

By: Desmedt, Yvo G [editor.]Contributor(s): SpringerLink (Online service)Material type: TextTextLanguage: English Series: Lecture Notes in Computer Science: 839Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1994Description: XII, 438 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540486589Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Coding theory | Combinatorics | Computer Science | Data Encryption | Coding and Information Theory | Operating Systems | Combinatorics | Computer Communication NetworksAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Block Ciphers: Differential and Linear Cryptanalysis -- The First Experimental Cryptanalysis of the Data Encryption Standard -- Linear Cryptanalysis of the Fast Data Encipherment Algorithm -- Differential-Linear Cryptanalysis -- Linear Cryptanalysis Using Multiple Approximations -- Schemes Based on New Problems -- Hashing with SL 2 -- Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks -- Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders -- Signatures I -- Designated Confirmer Signatures and Public-Key Encryption are Equivalent -- Directed Acyclic Graphs, One-way Functions and Digital Signatures -- An Identity-Based Signature Scheme with Bounded Life-Span -- Implementation and Hardware Aspects -- More Flexible Exponentiation with Precomputation -- A Parallel Permutation Multiplier for a PGM Crypto-chip -- Cryptographic Randomness from Air Turbulence in Disk Drives -- Authentication and Secret Sharing -- Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol -- LFSR-based Hashing and Authentication -- New Bound on Authentication Code with Arbitration -- Multi-Secret Sharing Schemes -- Zero-Knowledge -- Designing Identification Schemes with Keys of Short Size -- Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols -- Language Dependent Secure Bit Commitment -- On the length of cryptographic hash-values used in identification schemes -- Signatures II -- Incremental Cryptography: The Case of Hashing and Signing -- An Efficient Existentially Unforgeable Signature Scheme and its Applications -- Combinatorics and its Applications -- Bounds for Resilient Functions and Orthogonal Arrays -- Tracing Traitors -- Number Theory -- Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms -- Fast Generation of Provable Primes Using Search in Arithmetic Progressions -- Cryptanalysis and Protocol Failures -- Attack on the Cryptographic Scheme NIKS-TAS -- On the Risk of Opening Distributed Keys -- Cryptanalysis of Cryptosystems based on Remote Chaos Replication -- Pseudo-Random Generation -- A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences -- Block Ciphers: Design and Cryptanalysis -- The Security of Cipher Block Chaining -- A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem -- Ciphertext Only Attack for One-way function of the MAP using One Ciphertext -- Pitfalls in Designing Substitution Boxes -- Secure Computations and Protocols -- A Randomness-Rounds Tradeoff in Private Computation -- Secure Voting Using Partially Compatible Homomorphisms -- Maintaining Security in the Presence of Transient Faults.
In: Springer eBooksSummary: The CRYPTO ’94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the fourteenth annual CRYPTO conference, all of which have been held at UCSB. This is the first time that proceedings are available at the conference. The General Chair, Jimmy R. Upton has been responsible for local organization, registration, etc. There were 114 submitted papers which were considered by the Program Committee. Of these, 1 was withdrawn and 38 were selected for the proce- ings. There are also 3 invited talks. Two of these are on aspects of cryptog- phy in the commercial world. The one on hardware aspects will be presented by David Maher (AT&T), the one on software aspects by Joseph Pato (Hewlett- Packard). There will also be a panel discussion on “Securing an Electronic World: Are We Ready?” The panel members will be: Ross Anderson, Bob Blakley, Matt Blaze, George Davida, Yvo Desmedt (moderator), Whitfield Diffie, Joan Feig- baum, Blake Greenlee, Martin Hellman, David Maher, Miles Smid. The topic of the panel will be introduced by the invited talk of Whitfield Diffie on ”Securing the Information Highway. ” These proceedings contain revised versions of the 38 contributed talks. Each i paper was sent to at least 3 members of the program committee for comments.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Block Ciphers: Differential and Linear Cryptanalysis -- The First Experimental Cryptanalysis of the Data Encryption Standard -- Linear Cryptanalysis of the Fast Data Encipherment Algorithm -- Differential-Linear Cryptanalysis -- Linear Cryptanalysis Using Multiple Approximations -- Schemes Based on New Problems -- Hashing with SL 2 -- Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks -- Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders -- Signatures I -- Designated Confirmer Signatures and Public-Key Encryption are Equivalent -- Directed Acyclic Graphs, One-way Functions and Digital Signatures -- An Identity-Based Signature Scheme with Bounded Life-Span -- Implementation and Hardware Aspects -- More Flexible Exponentiation with Precomputation -- A Parallel Permutation Multiplier for a PGM Crypto-chip -- Cryptographic Randomness from Air Turbulence in Disk Drives -- Authentication and Secret Sharing -- Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol -- LFSR-based Hashing and Authentication -- New Bound on Authentication Code with Arbitration -- Multi-Secret Sharing Schemes -- Zero-Knowledge -- Designing Identification Schemes with Keys of Short Size -- Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols -- Language Dependent Secure Bit Commitment -- On the length of cryptographic hash-values used in identification schemes -- Signatures II -- Incremental Cryptography: The Case of Hashing and Signing -- An Efficient Existentially Unforgeable Signature Scheme and its Applications -- Combinatorics and its Applications -- Bounds for Resilient Functions and Orthogonal Arrays -- Tracing Traitors -- Number Theory -- Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms -- Fast Generation of Provable Primes Using Search in Arithmetic Progressions -- Cryptanalysis and Protocol Failures -- Attack on the Cryptographic Scheme NIKS-TAS -- On the Risk of Opening Distributed Keys -- Cryptanalysis of Cryptosystems based on Remote Chaos Replication -- Pseudo-Random Generation -- A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences -- Block Ciphers: Design and Cryptanalysis -- The Security of Cipher Block Chaining -- A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem -- Ciphertext Only Attack for One-way function of the MAP using One Ciphertext -- Pitfalls in Designing Substitution Boxes -- Secure Computations and Protocols -- A Randomness-Rounds Tradeoff in Private Computation -- Secure Voting Using Partially Compatible Homomorphisms -- Maintaining Security in the Presence of Transient Faults.

The CRYPTO ’94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the fourteenth annual CRYPTO conference, all of which have been held at UCSB. This is the first time that proceedings are available at the conference. The General Chair, Jimmy R. Upton has been responsible for local organization, registration, etc. There were 114 submitted papers which were considered by the Program Committee. Of these, 1 was withdrawn and 38 were selected for the proce- ings. There are also 3 invited talks. Two of these are on aspects of cryptog- phy in the commercial world. The one on hardware aspects will be presented by David Maher (AT&T), the one on software aspects by Joseph Pato (Hewlett- Packard). There will also be a panel discussion on “Securing an Electronic World: Are We Ready?” The panel members will be: Ross Anderson, Bob Blakley, Matt Blaze, George Davida, Yvo Desmedt (moderator), Whitfield Diffie, Joan Feig- baum, Blake Greenlee, Martin Hellman, David Maher, Miles Smid. The topic of the panel will be introduced by the invited talk of Whitfield Diffie on ”Securing the Information Highway. ” These proceedings contain revised versions of the 38 contributed talks. Each i paper was sent to at least 3 members of the program committee for comments.

There are no comments on this title.

to post a comment.

Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha