Advances in Cryptology — AUSCRYPT '92

Workshop on the Theory and Application of Cryptographic Techniques Gold Coast, Queensland, Australia, December 13–16, 1992 Proceedings


ISBN: 978-3-540-57220-6 (Print) 978-3-540-47976-5 (Online)

Table of contents (46 chapters)

previous Page of 3
  1. Book Chapter

    Pages 1-14

    Threshold cryptosystems

  2. Book Chapter

    Pages 15-26

    Authentication codes with perfect protection

  3. Book Chapter

    Pages 27-32

    Practical proven secure authentication with arbitration

  4. Book Chapter

    Pages 33-47

    Authentication codes under impersonation attack

  5. Book Chapter

    Pages 48-55

    Cumulative arrays and geometric secret sharing schemes

  6. Book Chapter

    Pages 56-66

    Nonperfect secret sharing schemes

  7. Book Chapter

    Pages 67-79

    A construction of practical secret sharing schemes using linear block codes

  8. Book Chapter

    Pages 81-104

    HAVAL — A one-way hashing algorithm with variable length of output (extended abstract)

  9. Book Chapter

    Pages 105-121

    On the power of memory in the design of collision resistant hash functions

  10. Book Chapter

    Pages 122-132

    A practical digital multisignature scheme based on discrete logarithms (extended abstract)

  11. Book Chapter

    Pages 133-142

    Group-oriented undeniable signature schemes without the assistance of a mutually trusted party

  12. Book Chapter

    Pages 143-155

    Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract)

  13. Book Chapter

    Pages 156-164

    Linear nonequivalence versus nonlinearity

  14. Book Chapter

    Pages 165-181

    Constructing large cryptographically strong S-boxes

  15. Book Chapter

    Pages 183-195

    Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept

  16. Book Chapter

    Pages 196-208

    Cryptanalysis of LOKI 91

  17. Book Chapter

    Pages 209-215

    Cryptanalysis of summation generator

  18. Book Chapter

    Pages 217-230

    Secure addition sequence and its applications on the server-aided secret computation protocols

  19. Book Chapter

    Pages 231-243

    Subliminal channels for signature transfer and their application to signature distribution schemes

  20. Book Chapter

    Pages 244-251

    A practical secret voting scheme for large scale elections

previous Page of 3