Adi Shamir (auth.), Douglas R. Stinson (eds.)3540577661, 9783540577669
Table of contents :
Efficient Signature Schemes Based on Birational Permutations….Pages 1-12
A new identification scheme based on syndrome decoding….Pages 13-21
The Shrinking Generator….Pages 22-39
An Integrity Check Value Algorithm for Stream Ciphers….Pages 40-48
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics….Pages 49-60
A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity….Pages 61-72
Secret Sharing and Perfect Zero Knowledge….Pages 73-84
One Message Proof Systems with Known Space Verifiers….Pages 85-99
Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions….Pages 100-109
Fully Dynamic Secret Sharing Schemes….Pages 110-125
Multisecret Threshold Schemes….Pages 126-135
Secret Sharing Made Short….Pages 136-146
A Subexponential Algorithm for Discrete Logarithms over All Finite Fields….Pages 147-158
An implementation of the general number field sieve….Pages 159-165
On the factorization of RSA-120….Pages 166-174
Comparison of three modular reduction functions….Pages 175-186
Differential Cryptanalysis of Lucifer….Pages 187-199
Differential Attack on Message Authentication Codes….Pages 200-211
Cryptanalysis of the CFB mode of the DES with a reduced number of rounds….Pages 212-223
Weak Keys for IDEA….Pages 224-231
Entity Authentication and Key Distribution….Pages 232-249
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures….Pages 250-265
Joint Encryption and Message-Efficient Secure Computation….Pages 266-277
Cryptographic Primitives Based on Hard Learning Problems….Pages 278-291
Extensions of Single-term Coins….Pages 292-301
Untraceable Off-line Cash in Wallet with Observers….Pages 302-318
Discreet Solitary Games….Pages 319-330
On Families of Hash Functions via Geometric Codes and Concatenation….Pages 331-342
On the Construction of Perfect Authentication Codes that Permit Arbitration….Pages 343-354
Codes for Interactive Authentication….Pages 355-367
Hash functions based on block ciphers: a synthetic approach….Pages 368-378
Security of Iterated Hash Functions Based on Block Ciphers….Pages 379-390
Improved Algorithms for the Permuted Kernel Problem….Pages 391-402
On the Distribution of Characteristics in Composite Permutations….Pages 403-412
Remark on the Threshold RSA Signature Scheme….Pages 413-419
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks….Pages 420-434
Attacks on the Birational Permutation Signature Schemes….Pages 435-443
Interaction in Key Distribution Schemes….Pages 444-455
Secret-Key Agreement without Public-Key Cryptography….Pages 456-479
Broadcast Encryption….Pages 480-491
Reviews
There are no reviews yet.