Book Volume 403 1990

Advances in Cryptology — CRYPTO’ 88



ISBN: 978-0-387-97196-4 (Print) 978-0-387-34799-8 (Online)

Table of contents (43 chapters)

previous Page of 3
  1. Front Matter

    Pages I-XI

  2. Cryptographic Primitives

    1. Chapter

      Pages 2-7

      Weakening Security Assumptions and Oblivious Transfer

    2. Chapter

      Pages 8-26

      Limits on the Provable Consequences of One-way Permutations

    3. Chapter

      Pages 27-35

      Generalized Secret Sharing and Monotone Functions

  3. Zero-Knowledge

    1. Chapter

      Pages 37-56

      Everything Provable is Provable in Zero-Knowledge

    2. Chapter

      Pages 57-70

      A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm

    3. Chapter

      Pages 71-75

      Zero-Knowledge With Finite State Verifiers

  4. Number Theory

    1. Chapter

      Pages 77-93

      Intractable Problems in Number Theory

    2. Chapter

      Pages 94-99

      A Family of Jacobians Suitable for Discrete Log Cryptosystems

    3. Chapter

      Pages 100-117

      Computation of Approximate L-th Roots Modulo n and Application to Cryptography

  5. Cryptanalysis

    1. Chapter

      Pages 119-131

      On the McEliece Public-Key Cryptosystem

    2. Chapter

      Pages 132-144

      A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers

  6. Pseudorandomness

    1. Chapter

      Pages 146-162

      On the Existence of Pseudorandom Generators

    2. Chapter

      Pages 163-172

      On The Randomness of Legendre and Jacobi Sequences

    3. Chapter

      Pages 173-198

      Efficient, Perfect Random Number Generators

  7. Signatures and Authentication

    1. Chapter

      Pages 200-215

      How To Sign Given Any Trapdoor Function

    2. Chapter

      Pages 216-231

      A “Paradoxical” Indentity-Based Signature Scheme Resulting from Zero-Knowledge

    3. Chapter

      Pages 232-243

      A Modification of the Fiat-Shamir Scheme

    4. Chapter

      Pages 244-247

      An Improvement of the Fiat-Shamir Identification and Signature Scheme

  8. On the Theory of Security I

    1. Chapter

      Pages 249-255

      A Basic Theory of Public and Private Cryptosystems

    2. Chapter

      Pages 256-268

      Proving Security Against Chosen Ciphertext Attacks

previous Page of 3