Advances in Cryptology — AUSCRYPT '92

Workshop on the Theory and Application of Cryptographic Techniques Gold Coast, Queensland, Australia, December 13–16, 1992 Proceedings

  • Editors
  • Jennifer Seberry
  • Yuliang Zheng
Conference proceedings AUSCRYPT 1992

DOI: 10.1007/3-540-57220-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 718)

Table of contents (46 papers)

  1. Front Matter
  2. Threshold cryptosystems
    Yvo Desmedt
    Pages 1-14
  3. Authentication codes with perfect protection
    L. Tombak, R. Safavi-Naini
    Pages 15-26
  4. Practical proven secure authentication with arbitration
    Yvo Desmedt, Jennifer Seberry
    Pages 27-32
  5. Authentication codes under impersonation attack
    R. Safavi-Naini, L. Tombak
    Pages 33-47
  6. Cumulative arrays and geometric secret sharing schemes
    Wen-Ai Jackson, Keith M. Martin
    Pages 48-55
  7. Nonperfect secret sharing schemes
    Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii
    Pages 56-66
  8. A construction of practical secret sharing schemes using linear block codes
    Michael Bertilsson, Ingemar Ingemarsson
    Pages 67-79
  9. HAVAL — A one-way hashing algorithm with variable length of output (extended abstract)
    Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry
    Pages 81-104
  10. On the power of memory in the design of collision resistant hash functions
    Bart Preneel, René Govaerts, Joos Vandewalle
    Pages 105-121
  11. Linear nonequivalence versus nonlinearity
    Chris Charnes, Josef Pieprzyk
    Pages 156-164
  12. Constructing large cryptographically strong S-boxes
    John Detombe, Stafford Tavares
    Pages 165-181
  13. Cryptanalysis of LOKI 91
    Lars Ramkilde Knudsen
    Pages 196-208
  14. Cryptanalysis of summation generator
    Ed Dawson
    Pages 209-215

About these proceedings


This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.


Computer Security Computersicherheit Cryptology Data Security Datensicherheit Hashing Public Key Cryptography Public-Key Kryptographie Secure Protocols Sichere Protokolle cryptography

Bibliographic information

  • Copyright Information Springer-Verlag 1993
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-57220-6
  • Online ISBN 978-3-540-47976-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349