Bart Preneel, Paul C. van Oorschot (auth.), Don Coppersmith (eds.)3540602216, 9783540602217
Table of contents :
MDx-MAC and Building Fast MACs from Hash Functions….Pages 1-14
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions….Pages 15-28
Bucket Hashing and its Application to Fast Message Authentication….Pages 29-42
Fast Key Exchange with Elliptic Curve Systems….Pages 43-56
Fast Server-Aided RSA Signatures Secure Against Active Attacks….Pages 57-69
Security and Performance of Server-Aided RSA Computation Protocols….Pages 70-83
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver….Pages 84-96
Precomputing Oblivious Transfer….Pages 97-109
Committed Oblivious Transfer and Private Multi-Party Computation….Pages 110-123
On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols….Pages 124-135
How to Break Shamir’s Asymmetric Basis….Pages 136-147
On the Security of the Gollmann Cascades….Pages 148-156
Improving the Search Algorithm for the Best Linear Expression….Pages 157-170
On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm….Pages 171-184
A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Key Escrow Systems….Pages 185-196
A Key Escrow System with Warrant Bounds….Pages 197-207
Fair Cryptosystems, Revisited….Pages 208-221
Escrow Encryption Systems Visited: Attacks, Analysis and Designs….Pages 222-235
Robustness Principles for Public Key Protocols….Pages 236-247
Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88….Pages 248-261
Cryptanalysis Based on 2-Adic Rational Approximation….Pages 262-273
A Key-schedule Weakness in SAFER K-64….Pages 274-286
Cryptanalysis of the Immunized LL Public Key Systems….Pages 287-296
Secure Signature Schemes based on Interactive Protocols….Pages 297-310
Improved Efficient Arguments….Pages 311-324
Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs….Pages 325-338
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage….Pages 339-352
Secret Sharing with Public Reconstruction….Pages 353-366
On General Perfect Secret Sharing Schemes….Pages 367-371
NFS with Four Large Primes: An Explosive Experiment….Pages 372-385
Some Remarks on Lucas-Based Cryptosystems….Pages 386-396
Threshold DSS Signatures without a Trusted Party….Pages 397-409
t -Cheater Identifiable ( k, n ) Threshold Secret Sharing Schemes….Pages 410-423
Quantum Cryptanalysis of Hidden Linear Functions….Pages 424-437
An Efficient Divisible Electronic Cash Scheme….Pages 438-451
Collusion-Secure Fingerprinting for Digital Data….Pages 452-465
Reviews
There are no reviews yet.