Claude Crépeau, Joe Kilian (auth.), Shafi Goldwasser (eds.)9783540971962, 3540971963
Table of contents :
Weakening Security Assumptions and Oblivious Transfer….Pages 2-7
Limits on the Provable Consequences of One-way Permutations….Pages 8-26
Generalized Secret Sharing and Monotone Functions….Pages 27-35
Everything Provable is Provable in Zero-Knowledge….Pages 37-56
A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm….Pages 57-70
Zero-Knowledge With Finite State Verifiers….Pages 71-75
Intractable Problems in Number Theory….Pages 77-93
A Family of Jacobians Suitable for Discrete Log Cryptosystems….Pages 94-99
Computation of Approximate L-th Roots Modulo n and Application to Cryptography….Pages 100-117
On the McEliece Public-Key Cryptosystem….Pages 119-131
A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers….Pages 132-144
On the Existence of Pseudorandom Generators….Pages 146-162
On The Randomness of Legendre and Jacobi Sequences….Pages 163-172
Efficient, Perfect Random Number Generators….Pages 173-198
How To Sign Given Any Trapdoor Function….Pages 200-215
A “Paradoxical” Indentity-Based Signature Scheme Resulting from Zero-Knowledge….Pages 216-231
A Modification of the Fiat-Shamir Scheme….Pages 232-243
An Improvement of the Fiat-Shamir Identification and Signature Scheme….Pages 244-247
A Basic Theory of Public and Private Cryptosystems….Pages 249-255
Proving Security Against Chosen Ciphertext Attacks….Pages 256-268
Non-Interactive Zero-Knowledge with Preprocessing….Pages 269-282
The Noisy Oracle Problem….Pages 284-296
On Generating Solved Instances of Computational Problems….Pages 297-310
Bounds and Constructions for Authentication – Secrecy Codes with Splitting….Pages 311-317
Untraceable Electronic Cash….Pages 319-327
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals….Pages 328-335
A Universal Problem in Secure and Verifiable Distributed Computation….Pages 336-352
An Abstract Theory of Computer Viruses….Pages 354-374
Abuses in Cryptography and How to Fight Them….Pages 375-389
How to (Really) Share a Secret….Pages 390-448
The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition….Pages 450-468
On the Linear Syndrome Method in Cryptanalysis….Pages 469-478
Aperiodic Linear Complexities of de Bruijn Sequences….Pages 479-482
The Application of Smart Cards for Rsa Digital Signatures in a Network Comprising Both Interactive and Store-and-Forward Facilities….Pages 484-496
Speeding Up Secret Computations with Insecure Auxiliary Devices….Pages 497-506
Developing Ethernet Enhanced-Security System….Pages 507-519
A Secure Audio Teleconference System….Pages 520-528
Diffie-Hellman is as Strong as Discrete Log for Certain Primes….Pages 530-539
Secret Error-Correcting Codes (SECC)….Pages 540-563
The Detection of Cheaters in Threshold Schemes….Pages 564-577
On the Power of 1-way Functions….Pages 578-579
“Practical IP” ⊆ MA….Pages 580-582
Zero-Knowledge Authentication Scheme with Secret Key Exchange….Pages 583-588
Reviews
There are no reviews yet.