×

Advances in cryptology – EUROCRYPT ’94. Workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9–12, 1994. Proceedings. (English) Zbl 0847.00061

Lecture Notes in Computer Science 950. Berlin: Springer-Verlag. xiii, 472 p. (1995).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding workshop see [Zbl 0847.00050].
Indexed articles:
Naor, Moni; Shamir, Adi, Visual cryptography, 1-12 [Zbl 0878.94048]
Csirmaz, László, The size of share must be large, 13-22 [Zbl 0885.94020]
van Dijk, Marten, A linear construction of perfect secret sharing schemes, 23-34 [Zbl 0909.94010]
Blundo, C.; Gaggia, A. Giorgio; Stinson, D. R., On the dealer’s randomness required in secret sharing schemes, 35-46 [Zbl 0885.94018]
Schnorr, C. P.; Vaudenav, S., Black box cryptanalysis of hash networks based on multipermutations, 47-57 [Zbl 0909.94013]
Joux, Antoine; Granboulan, Louis, A practical attack against knapsack based hash functions. (Extended abstract), 58-66 [Zbl 0909.94012]
Franklin, Matthew; Yung, Moti, The blinding of weak signatures. (Extended abstract), 67-76 [Zbl 0881.94014]
Naccache, David; M’Raïhi, David; Vaudenay, Serge; Raṗhaeli, Dan, Can D.S.A. be improved? Complexity trade-offs with the digital signature standard, 77-85 [Zbl 0881.94016]
Chaum, David, Designated confirmer signatures, 86-91 [Zbl 0881.94013]
Bellare, Mihir; Rogaway, Phillip, Optimal asymmetric encryption, 92-111 [Zbl 0881.94010]
Orton, Glenn, A multiple-iterated trapdoor for dense compact knapsacks., 112-130 [Zbl 1126.94334]
Chabaud, Florent, On the security of some cryptosystems based on error-correcting codes, 131-139 [Zbl 0881.94018]
Chen, L.; Damgård, I. B.; Pedersen, T. P., Parallel divertibility of proofs of knowledge. (Extended abstract), 140-155 [Zbl 0881.94017]
D’Amiano, Stefano; Di Crescenzo, Giovanni, Methodology for digital money based on general cryptographic tools, 156-170 [Zbl 0879.94034]
Chen, L.; Pedersen, T. P., New group signature schemes. (Extended abstract), 171-181 [Zbl 0879.94027]
Nyberg, Kaisa; Rueppel, Rainer A., Message recovery for signature schemes based on the discrete logarithm problem, 182-193 [Zbl 0879.94028]
Li, Chuan-Ming; Hwang, Tzonelih; Lee, Narn-Yih, Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders, 194-204 [Zbl 0881.94015]
Meier, Willi; Staffelbach, Othmar, The self-shrinking generator, 205-214 [Zbl 0881.94009]
Goresky, Mark; Klapper, Andrew, Feedback registers based on ramified extensions of the 2-adic numbers. (Extended abstract), 215-222 [Zbl 0879.94019]
Göttfert, Rainer; Niederreiter, Harald, A general lower bound for the linear complexity of the product of shift-register sequences, 223-229 [Zbl 0881.94008]
Golić, Jovan Dj.; O’Connor, Luke, Embedding and probabilistic correlation attacks on clock-controlled shift registers, 230-243 [Zbl 0879.94020]
Taylor, Richard, Near optimal unconditionally secure authentication, 244-253 [Zbl 0879.94029]
Safavi-Naini, R.; Tombak, L., Authentication codes in plaintext and chosen-content attacks, 254-265 [Zbl 0885.94026]
Cachin, Christian; Maurer, Ueli M., Linking information reconciliation and privacy amplification. (Extended abstract), 266-274 [Zbl 0879.94022]
Burmester, Mike; Desmedt, Yvo, A secure and efficient conference key distribution system. (Extended abstract), 275-286 [Zbl 0879.94021]
Blundo, Carlo; Cresti, Antonella, Space requirements for broadcast encryption, 287-298 [Zbl 0879.94030]
Zheng, Yuliang, How to break and repair Leighton and Micali’s key agreement protocol, 299-305 [Zbl 0879.94032]
Eng, Tony; Okamoto, Tatsuaki, Single-term divisible electronic coins, 306-319 [Zbl 0879.94035]
Syverson, Paul; Meadows, Catherine, Formal requirements for key distribution protocols., 320-331 [Zbl 1126.94342]
Pfitzmann, Birgit, Breaking an efficient anonymous channel, 332-340 [Zbl 0879.94031]
Biham, Eli, On Matsui’s linear cryptoanalysis, 341-355 [Zbl 0879.94025]
Chabaud, Florent; Vaudenay, Serge, Links between differential and linear cryptanalysis, 356-365 [Zbl 0879.94023]
Matsui, Mitsuru, On correlation between the order of S-boxes and the strength of DES, 366-375 [Zbl 0879.94024]
Seberry, Jennifer; Zhang, Xiao-Mo; Zhang, Yuliang, Relationship among nonlinearity criteria. (Extended abstract), 376-388 [Zbl 0909.94014]
de Rooij, Peter, Efficient exponentiation using precomputation and vector addition chains, 389-399 [Zbl 0879.94026]
Damm, F.; Heider, F.-P.; Wambach, G., MIMD-factorisation on hypercubes, 400-409 [Zbl 0957.11053]
Knudsen, Lars R.; Lai, Xuejia, New attacks on all double block length hash functions of hash rate 1, including the Parallel-DM, 410-418 [Zbl 0885.94021]
Knudsen, Lars Ramkilde, New potentially ‘weak’ keys for DES and LOKI. (Extended abstract), 419-424 [Zbl 0925.94090]
Jakobsson, Markus, Blackmailing using undeniable signatures, 425-427 [Zbl 0909.94011]
Camenisch, Jan L.; Piveteau, Jean-Marc; Stadler, Markus A., Blind signatures based on the discrete logarithm problem, 428-432 [Zbl 0885.94019]
Charnes, C.; O’Connor, L.; Pieprzyk, J.; Safavi-Naini, R.; Zheng, Y., Comments on Soviet encryption algorithm, 433-438 [Zbl 0879.94033]
Nyberg, Kaisa, Linear approximation of block ciphers, 439-444 [Zbl 0885.94023]
Shamir, Adi, Memory efficient variants of public-key schemes for smart card applications, 445-449 [Zbl 0885.94027]
Menicocci, Renato, A systematic attack on clock controlled cascades, 450-455 [Zbl 0885.94022]
Johansson, Thomas; Smeets, Ben, On \(A^ 2\)-codes including arbiter’s attacks, 456-460 [Zbl 0888.94014]
Biham, Eli; Biryukov, Alex, An improvement of Davies’ attack on DES, 461-467 [Zbl 0881.94011]
Hruby, J., \(q\)-deformed quantum cryptography, 468-472 [Zbl 0881.94019]

MSC:

00B25 Proceedings of conferences of miscellaneous specific interest
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
68P25 Data encryption (aspects in computer science)
94A60 Cryptography
Full Text: DOI