Advances in Cryptology — EUROCRYPT ’93

Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23–27, 1993 Proceedings

  • Tor Helleseth
Conference proceedings EUROCRYPT 1993

DOI: 10.1007/3-540-48285-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 765)

Table of contents (42 papers)

  1. Front Matter
    Pages I-X
  2. Authentication

    1. On the Relation Between A-Codes and Codes Correcting Independent Errors
      Thomas Johansson, Gregory Kabatianskii, Ben Smeets
      Pages 1-11
    2. Optimal Authentication Systems
      R. Safavi-Naini, L. Tombak
      Pages 12-27
  3. Public Key

    1. Factoring Integers Using SIMD Sieves
      Brandon Dixon, Arjen K. Lenstra
      Pages 28-39
    2. Weaknesses of a public-key cryptosystem based on factorizations of finite groups
      Simon Blackburn, Sean Murphy, Jacques Stern
      Pages 50-54
  4. Block Ciphers

  5. Secret Sharing

    1. Size of Shares and Probability of Cheating in Threshold Schemes
      Marco Carpentieri, Alfredo De Santis, Ugo Vaccaro
      Pages 118-125
    2. Nonperfect Secret Sharing Schemes and Matroids
      Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii
      Pages 126-141
  6. Stream ciphers

    1. From the memoirs of a Norwegian cryptologist
      Ernst S. Selmer
      Pages 142-150
    2. On the Linear Complexity of Products of Shift-Register Sequences
      Rainer Göttfert, Harald Niederreiter
      Pages 151-158
    3. Resynchronization Weaknesses in Synchronous Stream Ciphers
      Joan Daemen, René Govaerts, Joos Vandewalle
      Pages 159-167
    4. Blind Synchronization of m-Sequences with Even Span
      Richard A. Games, Joseph J. Rushanan
      Pages 168-180
    5. On Constructions and Nonlinearity of Correlation Immune Functions
      Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
      Pages 181-199
  7. Digital signatures

About these proceedings

Introduction

Eurocrypt is a series of open workshops on the theory and application of cryptographic techniques. These meetings have taken place in Europe every year since 1982 and are sponsored by the International Association for Cryptologic Research. Eurocrypt '93 was held in the village of Lofthus in Norway in May 1993. The call for papers resulted in 117 submissions with authors representing 27 different countries. The 36 accepted papers were selected by the program committee after a blind refereeing process. The papers are grouped into parts on authentication, public key, block ciphers, secret sharing, stream ciphers, digital signatures, protocols, hash functions, payment systems, and cryptanalysis. The volume includes 6 further rump session papers.

Keywords

Datenverschlüsselung Informationstheorie Kodierungstheorie Kryptographische Funktionen Kryptologie authentication coding theory cryptoanalysis cryptographic functions cryptology data encryption encryption hash function information theory sec

Editors and affiliations

  • Tor Helleseth
    • 1
  1. 1.Department of InformaticsUniversity of BergenBergenNorway

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1994
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-57600-6
  • Online ISBN 978-3-540-48285-7
  • Series Print ISSN 0302-9743