Book Volume 576 1992

Advances in Cryptology — CRYPTO ’91



ISBN: 978-3-540-55188-1 (Print) 978-3-540-46766-3 (Online)

Table of contents (38 chapters)

previous Page of 2
  1. Front Matter

    Pages I-X

  2. Protocol Design and Analysis

    1. Chapter

      Pages 1-23

      A Calculus for Access Control in Distributed Systems

    2. Chapter

      Pages 24-43

      Deriving the Complete Knowledge of Participants in Cryptographic Protocols

    3. Chapter

      Pages 44-61

      Systematic Design of Two-Party Authentication Protocols

  3. Combinatorics and Authentication

    1. Chapter

      Pages 62-73

      Combinatorial characterizations of authentication codes

    2. Chapter

      Pages 74-85

      Universal hashing and authentication codes

    3. Chapter

      Pages 86-100

      On Correlation-immune functions

  4. Secret Sharing and Information Theory

    1. Chapter

      Pages 101-113

      On the Size of Shares for Secret Sharing Schemes

    2. Chapter

      Pages 114-128

      On Verification in Secret Sharing

    3. Chapter

      Pages 129-140

      Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing

    4. Chapter

      Pages 141-155

      Multiparty Secret Key Exchange Using a Random Deal of Cards

  5. Cryptanalysis

    1. Chapter

      Pages 156-171

      Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer

    2. Chapter

      Pages 172-182

      A Known Plaintext Attack of FEAL-4 and FEAL-6

    3. Chapter

      Pages 183-193

      A switching closure test to analyze cryptosystems

    4. Chapter

      Pages 194-203

      An Attack on the Last Two Rounds of MD4

    5. Chapter

      Pages 204-212

      The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

  6. Complexity Theory

    1. Chapter

      Pages 213-224

      A One-Round, Two-Prover, Zero-Knowledge Protocol for NP

    2. Chapter

      Pages 225-231

      Interactive Proofs with Space Bounded Provers

    3. Chapter

      Pages 232-241

      Functional Inversion and Communication Complexity

    4. Chapter

      Pages 242-251

      The Use of Interaction in Public Cryptosystems.

  7. Cryptographic Schemes Based on Number Theory

    1. Chapter

      Pages 252-266

      New Public-Key Schemes Based on Elliptic Curves over the Ring Zn

previous Page of 2