Advances in Cryptology — EUROCRYPT ’89

Workshop on the Theory and Application of Cryptographic Techniques Houthalen, Belgium, April 10–13, 1989 Proceedings

Editors:

ISBN: 978-3-540-53433-4 (Print) 978-3-540-46885-1 (Online)

Table of contents (72 chapters)

previous Page of 4
  1. Front Matter

    Pages I-X

  2. Public-key cryptosystems

    1. Book Chapter

      Pages 2-2

      The Adolescence of Public-Key Cryptography

    2. Book Chapter

      Pages 3-15

      A Secure Public-Key Authentication Scheme

    3. Book Chapter

      Pages 16-22

      How to improve signature schemes

    4. Book Chapter

      Pages 23-28

      A Generalization of El Gamal’s Public Key Cryptosystem

    5. Book Chapter

      Pages 29-37

      An Identity-Based Key-Exchange Protocol

    6. Book Chapter

      Pages 38-46

      How to Keep Authenticity Alive in a Computer Network

    7. Book Chapter

      Pages 47-55

      The Use of Fractions in Public-Key Cryptosystems

    8. Book Chapter

      Pages 56-61

      A Practical Protocol for Large Group Oriented Networks

  3. Theory

    1. Book Chapter

      Pages 63-74

      Counting Functions Satisfying a Higher Order Strict Avalanche Criterion

    2. Book Chapter

      Pages 75-79

      A Key Distribution System Based On Any One-Way Function

    3. Book Chapter

      Pages 80-92

      Non-linearity of Exponent Permutations

    4. Book Chapter

      Pages 93-101

      Informational Divergence Bounds for Authentication Codes

    5. Book Chapter

      Pages 102-109

      2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms

    6. Book Chapter

      Pages 110-120

      A Simple Technique for Diffusing Cryptoperiods

  4. Zero-knowledge protocols

    1. Book Chapter

      Pages 122-133

      A General Zero-Knowledge Scheme

    2. Book Chapter

      Pages 134-149

      Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility

    3. Book Chapter

      Pages 150-154

      Verifiable Disclosure of Secrets and Applications (Abstract)

    4. Book Chapter

      Pages 155-172

      Practical Zero-Knowledge Proofs: Giving Hints and Using Deficiencies

    5. Book Chapter

      Pages 173-180

      An alternative to the Fiat-Shamir protocol

    6. Book Chapter

      Pages 181-191

      Sorting out zero-knowledge

previous Page of 4