Advances in Cryptology — EUROCRYPT’ 92

Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24–28, 1992 Proceedings

  • Rainer A. Rueppel
Conference proceedings EUROCRYPT 1992

DOI: 10.1007/3-540-47555-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 658)

Table of contents (45 papers)

  1. Front Matter
    Pages i-x
  2. Secret Sharing

    1. Graph Decompositions and Secret Sharing Schemes
      C. Blundo, A. De Santis, D. R. Stinson, U. Vaccaro
      Pages 1-24
  3. Hash Functions

    1. F.F.T. Hashing is not Collision-free
      T. Baritaud, H. Gilbert, M. Girault
      Pages 35-44
    2. Hash Functions Based on Block Ciphers
      Xucjia Lai, James L. Massey
      Pages 55-70
  4. Block Ciphers

  5. Stream Ciphers

  6. Public Key I

    1. Attacks on Protocols for Server-Aided RSA Computation
      Birgit Pfitzmann, Michael Waidner
      Pages 153-162
    2. Public-Key Cryptosystems with Very Small Key Lengths
      Greg Harper, Alfred Menezes, Scott Vanstone
      Pages 163-173
  7. Factoring

    1. Massively parallel elliptic curve factoring
      B. Dixon, A. K. Lenstra
      Pages 183-193
  8. The Eurocrypt’92 Controversial Issue Trapdoor Primes and Moduli

  9. Public Key II

    1. Fast Exponentiation with Precomputation
      Ernest F. Brickell, Daniel M. Gordon, Kevin S. McCurley, David B. Wilson
      Pages 200-207

About these proceedings

Introduction

A series of workshops devoted to modern cryptography began in Santa Barbara,California in 1981 and was followed in 1982 by a European counterpart in Burg Feuerstein, Germany. The series has been maintained with summer meetings in Santa Barbara and spring meetings somewhere in Europe. At the 1983 meeting in Santa Barbara the International Association for Cryptologic Research was launched and it now sponsors all the meetings of the series. This volume presents the proceedings of Eurocrypt '92, held in Hungary. The papers are organized into the following parts: Secret sharing, Hash functions, Block ciphers, Stream ciphers, Public key I, Factoring, Trapdoor primes and moduli (panel report), Public key II, Pseudo-random permutation generators, Complexity theory and cryptography I, Zero-knowledge, Digital knowledge and electronic cash, Complexity theory andcryptography II, Applications, and selected papers from the rump session. Following the tradition of the series, the authors produced full papers after the meeting, in some cases with revisions.

Keywords

Cryptanalysis Komplexitätstheorie Krypto-Analysis Permutation Pseudo-Zufall-Permutationen Public-Key-Cryptosystems Public-Key-Kryptosysteme Z complexity theory cryptoanalysis cryptography cryptology cryptosystems hash function secret sharing

Editors and affiliations

  • Rainer A. Rueppel
    • 1
  1. 1.R3 Security EngineeringWetzikonSwitzerland

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1993
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-56413-3
  • Online ISBN 978-3-540-47555-2
  • Series Print ISSN 0302-9743