Thomas Johansson, Gregory Kabatianskii, Ben Smeets (auth.), Tor Helleseth (eds.)3540576002, 9783540576006
Table of contents :
On the Relation Between A-Codes and Codes Correcting Independent Errors….Pages 1-11
Optimal Authentication Systems….Pages 12-27
Factoring Integers Using SIMD Sieves….Pages 28-39
A New Elliptic Curve Based Analogue of RSA….Pages 40-49
Weaknesses of a public-key cryptosystem based on factorizations of finite groups….Pages 50-54
Differentially uniform mappings for cryptography….Pages 55-64
On Almost Perfect Nonlinear Permutations….Pages 65-76
Two New Classes of Bent Functions….Pages 77-101
Boolean functions satisfying a higher order strict avalanche criterion….Pages 102-117
Size of Shares and Probability of Cheating in Threshold Schemes….Pages 118-125
Nonperfect Secret Sharing Schemes and Matroids….Pages 126-141
From the memoirs of a Norwegian cryptologist….Pages 142-150
On the Linear Complexity of Products of Shift-Register Sequences….Pages 151-158
Resynchronization Weaknesses in Synchronous Stream Ciphers….Pages 159-167
Blind Synchronization of m-Sequences with Even Span….Pages 168-180
On Constructions and Nonlinearity of Correlation Immune Functions….Pages 181-199
Practical and Provably Secure Release of a Secret and Exchange of Signatures….Pages 200-217
Subliminal Communication is Easy Using the DSA….Pages 218-232
Can O.S.S. be Repaired? – Proposal for a New Practical Signature Scheme -….Pages 233-239
On a Limitation of BAN Logic….Pages 240-247
Efficient Anonymous Channel and All/Nothing Election Scheme….Pages 248-259
Untransferable Rights in a Client-Independent Server Environment….Pages 260-266
Interactive Hashing Simplifies Zero-Knowledge Protocol Design….Pages 267-273
One-Way Accumulators: A Decentralized Alternative to Digital Signatures….Pages 274-285
The breaking of the AR Hash Function….Pages 286-292
Collisions for the compression function of MD5….Pages 293-304
How to Find and Avoid Collisions for the Knapsack Hash Function….Pages 305-317
Single Term Off-Line Coins….Pages 318-328
Improved Privacy in Wallets with Observers….Pages 329-343
Distance-Bounding Protocols….Pages 344-359
On the Distribution of Characteristics in Bijective Mappings….Pages 360-370
On the Security of the IDEA Block Cipher….Pages 371-385
Linear Cryptanalysis Method for DES Cipher….Pages 386-397
New Types of Cryptanalytic Attacks Using Related Keys….Pages 398-409
Secret-Key Reconciliation by Public Discussion….Pages 410-423
Global, Unpredictable Bit Generation Without Broadcast….Pages 424-434
On Schnorr’s Preprocessing for Digital Signature Schemes….Pages 435-439
Cryptanalysis of the Chang-Wu-Chen key distribution system….Pages 440-442
An Alternate Explanation of two BAN-logic “failures”….Pages 443-447
The Consequences of Trust in Shared Secret Schemes….Pages 448-452
Markov Ciphers and Alternating Groups….Pages 453-460
On Key Distribution and Authentication in Mobile Radio Networks….Pages 461-465
Reviews
There are no reviews yet.