Advances in Cryptology — CRYPTO ’98: 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 1462

ISBN: 3540648925, 9783540648925

Size: 8 MB (8430332 bytes)

Pages: 524/540

File format:

Language:

Publishing Year:

Category: Tags: , , , ,

Daniel Bleichenbacher (auth.), Hugo Krawczyk (eds.)3540648925, 9783540648925

This book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO’98, held in Santa Barbara, California, USA, in August 1998. The book presents 33 revised full papers selected from a total of 144 submissions received. Also included are two invited presentations. The papers are organized in topical sections on chosen ciphertext security, cryptanalysis of hash functions and block ciphers, distributed cryptography, zero knowledge, and implementation.

Table of contents :
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1….Pages 1-12
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack….Pages 13-25
Relations among notions of security for public-key encryption schemes….Pages 26-45
Cryptography and the internet….Pages 46-55
Differential collisions in SHA-0….Pages 56-71
From differential cryptanalysis to ciphertext-only attacks….Pages 72-88
A simplified approach to threshold and proactive RSA….Pages 89-104
New efficient and secure protocols for verifiable signature sharing and other applications….Pages 105-120
Trading correctness for privacy in unconditional multi-party computation….Pages 121-136
Fast digital identity revocation….Pages 137-152
Self-delegation with controlled propagation — or — What if you lose your laptop….Pages 153-168
Identity escrow….Pages 169-185
Generalized birthday attacks on unbalanced Feistel networks….Pages 186-199
Quadratic relation of S-box and its application to the linear attack of full round DES….Pages 200-211
Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree….Pages 212-222
Cryptanalysis of the Ajtai-Dwork cryptosystem….Pages 223-242
Cryptanalysis of the Chor-Rivest cryptosystem….Pages 243-256
Cryptanalysis of the oil and vinegar signature scheme….Pages 257-266
From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs….Pages 267-282
Many-to-one trapdoor functions and their relation to public-key cryptosystems….Pages 283-298
Authentication, enhanced security and error correcting codes….Pages 299-303
An efficient discrete log pseudo random generator….Pages 304-317
Fast RSA-type cryptosystem modulo p k q ….Pages 318-326
An elliptic curve implementation of the finite field digital signature algorithm….Pages 327-337
Quantum bit commitment from a physical assumption….Pages 338-353
On concrete security treatment of signatures derived from identification….Pages 354-369
Building PRFs from PRPs….Pages 370-389
Security amplification by composition: The case of doubly-iterated, ideal ciphers….Pages 390-407
On the existence of 3-round zero-knowledge protocols….Pages 408-423
Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free?….Pages 424-441
Concurrent zero-knowledge: Reducing the need for timing constraints….Pages 442-457
The solution of McCurley’s discrete log challenge….Pages 458-471
Optimal extension fields for fast arithmetic in public-key algorithms….Pages 472-485
Time-stamping with binary linking schemes….Pages 486-501
Threshold traitor tracing….Pages 502-517

Reviews

There are no reviews yet.

Be the first to review “Advances in Cryptology — CRYPTO ’98: 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings”
Shopping Cart
Scroll to Top