Advances in Cryptology — AUSCRYPT '92

Workshop on the Theory and Application of Cryptographic Techniques Gold Coast, Queensland, Australia, December 13–16, 1992 Proceedings

Editors:

ISBN: 978-3-540-57220-6 (Print) 978-3-540-47976-5 (Online)

Table of contents (46 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-14

    Threshold cryptosystems

  3. No Access

    Book Chapter

    Pages 15-26

    Authentication codes with perfect protection

  4. No Access

    Book Chapter

    Pages 27-32

    Practical proven secure authentication with arbitration

  5. No Access

    Book Chapter

    Pages 33-47

    Authentication codes under impersonation attack

  6. No Access

    Book Chapter

    Pages 48-55

    Cumulative arrays and geometric secret sharing schemes

  7. No Access

    Book Chapter

    Pages 56-66

    Nonperfect secret sharing schemes

  8. No Access

    Book Chapter

    Pages 67-79

    A construction of practical secret sharing schemes using linear block codes

  9. No Access

    Book Chapter

    Pages 81-104

    HAVAL — A one-way hashing algorithm with variable length of output (extended abstract)

  10. No Access

    Book Chapter

    Pages 105-121

    On the power of memory in the design of collision resistant hash functions

  11. No Access

    Book Chapter

    Pages 122-132

    A practical digital multisignature scheme based on discrete logarithms (extended abstract)

  12. No Access

    Book Chapter

    Pages 133-142

    Group-oriented undeniable signature schemes without the assistance of a mutually trusted party

  13. No Access

    Book Chapter

    Pages 143-155

    Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract)

  14. No Access

    Book Chapter

    Pages 156-164

    Linear nonequivalence versus nonlinearity

  15. No Access

    Book Chapter

    Pages 165-181

    Constructing large cryptographically strong S-boxes

  16. No Access

    Book Chapter

    Pages 183-195

    Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept

  17. No Access

    Book Chapter

    Pages 196-208

    Cryptanalysis of LOKI 91

  18. No Access

    Book Chapter

    Pages 209-215

    Cryptanalysis of summation generator

  19. No Access

    Book Chapter

    Pages 217-230

    Secure addition sequence and its applications on the server-aided secret computation protocols

  20. No Access

    Book Chapter

    Pages 231-243

    Subliminal channels for signature transfer and their application to signature distribution schemes

  21. No Access

    Book Chapter

    Pages 244-251

    A practical secret voting scheme for large scale elections

previous Page of 3