Book Volume 839 1994

Advances in Cryptology — CRYPTO ’94

14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings


ISBN: 978-3-540-58333-2 (Print) 978-3-540-48658-9 (Online)

Table of contents (38 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XII

  2. Block Ciphers: Differential and Linear Cryptanalysis

    1. Chapter

      Pages 1-11

      The First Experimental Cryptanalysis of the Data Encryption Standard

    2. Chapter

      Pages 12-16

      Linear Cryptanalysis of the Fast Data Encipherment Algorithm

    3. Chapter

      Pages 17-25

      Differential-Linear Cryptanalysis

    4. Chapter

      Pages 26-39

      Linear Cryptanalysis Using Multiple Approximations

  3. Schemes Based on New Problems

    1. Chapter

      Pages 40-49

      Hashing with SL 2

    2. Chapter

      Pages 50-55

      Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks

    3. Chapter

      Pages 56-60

      Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders

  4. Signatures I

    1. Chapter

      Pages 61-74

      Designated Confirmer Signatures and Public-Key Encryption are Equivalent

    2. Chapter

      Pages 75-82

      Directed Acyclic Graphs, One-way Functions and Digital Signatures

    3. Chapter

      Pages 83-94

      An Identity-Based Signature Scheme with Bounded Life-Span

  5. Implementation and Hardware Aspects

    1. Chapter

      Pages 95-107

      More Flexible Exponentiation with Precomputation

    2. Chapter

      Pages 108-113

      A Parallel Permutation Multiplier for a PGM Crypto-chip

    3. Chapter

      Pages 114-120

      Cryptographic Randomness from Air Turbulence in Disk Drives

  6. Authentication and Secret Sharing

    1. Chapter

      Pages 121-128

      Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol

    2. Chapter

      Pages 129-139

      LFSR-based Hashing and Authentication

    3. Chapter

      Pages 140-149

      New Bound on Authentication Code with Arbitration

    4. Chapter

      Pages 150-163

      Multi-Secret Sharing Schemes

  7. Zero-Knowledge

    1. Chapter

      Pages 164-173

      Designing Identification Schemes with Keys of Short Size

    2. Chapter

      Pages 174-187

      Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols

    3. Chapter

      Pages 188-201

      Language Dependent Secure Bit Commitment

previous Page of 2