Yvo Desmedt (auth.), Jennifer Seberry, Yuliang Zheng (eds.)3540572201, 9783540572206, 0387572201
Table of contents :
Threshold cryptosystems….Pages 1-14
Authentication codes with perfect protection….Pages 15-26
Practical proven secure authentication with arbitration….Pages 27-32
Authentication codes under impersonation attack….Pages 33-47
Cumulative arrays and geometric secret sharing schemes….Pages 48-55
Nonperfect secret sharing schemes….Pages 56-66
A construction of practical secret sharing schemes using linear block codes….Pages 67-79
HAVAL — A one-way hashing algorithm with variable length of output (extended abstract)….Pages 81-104
On the power of memory in the design of collision resistant hash functions….Pages 105-121
A practical digital multisignature scheme based on discrete logarithms (extended abstract)….Pages 122-132
Group-oriented undeniable signature schemes without the assistance of a mutually trusted party….Pages 133-142
Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract)….Pages 143-155
Linear nonequivalence versus nonlinearity….Pages 156-164
Constructing large cryptographically strong S-boxes….Pages 165-181
Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept….Pages 183-195
Cryptanalysis of LOKI 91….Pages 196-208
Cryptanalysis of summation generator….Pages 209-215
Secure addition sequence and its applications on the server-aided secret computation protocols….Pages 217-230
Subliminal channels for signature transfer and their application to signature distribution schemes….Pages 231-243
A practical secret voting scheme for large scale elections….Pages 244-251
Privacy for multi-party protocols….Pages 252-260
New protocols for electronic money….Pages 261-274
Modelling and analyzing cryptographic protocols using Petri nets….Pages 275-295
On verifiable implicit asking protocols for RSA computation….Pages 296-307
Modified Maurer-Yacobi’s scheme and its applications….Pages 308-323
The vulnerability of geometric sequences based on fields of odd characteristic….Pages 325-338
A fast cryptographic checksum algorithm based on stream ciphers….Pages 339-348
An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure….Pages 349-356
Construction of m -ary de Bruijn sequences (extended abstract)….Pages 357-363
Information technology security standards — An Australian perspective….Pages 365-384
Non-interactive generation of shared pseudorandom sequences….Pages 385-396
A generalized description of DES-based and Benes-based permutationgenerators….Pages 397-409
Prime generation with the Demytko-Miller-Trbovich algorithm….Pages 411-421
Constructions of feebly-one-way families of permutations….Pages 422-434
On bit correlations among preimages of “Many to one” One-way functions….Pages 435-446
The fast cascade exponentiation algorithm and its applications on cryptography….Pages 447-456
The design of a conference key distribution system….Pages 457-466
Remarks on “The design of a Conference Key Distribution System”….Pages 467-468
Public-key cryptosystem based on the discrete logarithm problem….Pages 469-476
Elliptic curves over F p suitable for cryptosystems….Pages 477-491
The probability Distribution of the Diffie-Hellman Key….Pages 492-504
A modular exponentiation unit based on systolic arrays….Pages 505-516
A comparison of key distribution patterns constructed from circle geometries….Pages 517-527
A block cipher method using combinations of different methods under the control of the user key….Pages 529-534
An attack on two hash functions by Zheng-Matsumoto-Imai….Pages 535-538
Primality testing with Lucas functions….Pages 539-542
Reviews
There are no reviews yet.