Workshop on the Theory and Application of Cryptographic Techniques Davos, Switzerland, May 25-27, 1988 Proceedings
First Statement of Responsibility
edited by D. Barstow, W. Brauer, P. Brinch Hansen, D. Gries, D. Luckham, C. Moler, A. Pnueli, G. Seegmüller, J. Stoer, N. Wirth, Christoph G. Günther.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Berlin, Heidelberg
Name of Publisher, Distributor, etc.
Springer Berlin Heidelberg
Date of Publication, Distribution, etc.
1988
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
(VI, 383 pages)
SERIES
Series Title
Lecture notes in computer science, 330.
CONTENTS NOTE
Text of Note
Key Distribution --; Key Agreements Based on Function Composition --; Security of Improved Identity-based Conference Key Distribution Systems --; Authentication --; Subliminal-free Authentication and Signature --; Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts --; Authentication Codes with Multiple Arbiters --; Some Constructions for Authentication --; Secrecy Codes --; Efficient Zero-Knowledge Identification Scheme for Smart Cards --; Signatures --; A Smart Card Implementation of the Fiat-Shamir Identification Scheme --; Manipulations and Errors, Detection and Localization --; Privacy Protected Payments --; Realization of a Protocol That Guarantees Payer Anonymity --; A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory --; A Generalized Birthday Attack --; Protocols --; An Interactive Data Exchange Protocol Based on Discrete Exponentiation --; Anonymous and Verifiable Registration in Databases --; Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA --; Passports and Visas Versus IDs --; Complexity and Number Theory --; The Probabilistic Theory of Linear Complexity --; A Probabilistic Primality Test Based on the Properties of Certain Generalized Lucas Numbers --; On the Construction of Random Number Generators and Random Function Generators --; Numerical Methods --; Factorization of Large Integers on a Massively Parallel Computer --; A Fast Modular Arithmetic Algorithm Using a Residue Table --; Fast Exponentiation in GF(2n) --; Fast RSA-Hardware: Dream or Reality? --; Cryptanalysis --; Properties of the Euler Totient Function Modulo 24 and Some of Its Cryptographic Implications --; An Observation on the Security of McEliece's Public-Key Cryptosystem --; How to Break Okamoto's Cryptosystem by Reducing Lattice Bases --; Cryptanalysis of F.E.A.L. --; Fast Correlation Attacks on Stream Ciphers --; Running-Key Ciphers --; A New Class of Nonlinear Functions for Running-key Generators --; Windmill Generators A generalization and an observation of how many there are --; Lock-in Effect in Cascades of Clock-Controlled Shift-Registers --; Proof of Massey's Conjectured Algorithm --; Linear Recurring m-Arrays --; Cipher Theory and Threshold --; Substantial Number of Cryptographic Keys and Its Application to Encryption Designs --; A Measure of Semiequivocation --; Some New Classes of Geometric Threshold Schemes --; New Ciphers --; A Universal Algorithm for Homophonic Coding --; A New Probabilistic Encryption Scheme --; Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption --; Some Applications of Multiple Key Ciphers.
SUMMARY OR ABSTRACT
Text of Note
This book contains the proceedings of the EUROCRYPT '88 conference, a workshop on theory and applications of cryptographic techniques held at Davos, Switzerland, May 25-27, 1988. The International Association for Cryptologic Research (IACR) organizes two international conferences every year, one in Europe and one in the United States. EUROCRYPT '88 was the sixth European conference. The number of contributions and of participants at the meetinng has increased substantially, which shows the high interest in cryptography and in system security in general. The interest has also further moved towards authentication, signatures and other protocols. This is to understand in view of the urgent needs for such protocols, in particular in connection with open information systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, i.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems, was however also well represented and several significant results were communicated. These proceedings contain all contributions accepted for presentation.
TOPICAL NAME USED AS SUBJECT
Computer science.
Data encryption (Computer science)
PERSONAL NAME - PRIMARY RESPONSIBILITY
edited by D. Barstow, W. Brauer, P. Brinch Hansen, D. Gries, D. Luckham, C. Moler, A. Pnueli, G. Seegmüller, J. Stoer, N. Wirth, Christoph G. Günther.