Table of contents (46 papers)

  1. Front Matter
  2. Cryptanalysis of LOKI
    Lars Ramkilde Knudsen
    Pages 22-35
  3. Improving resistance to differential cryptanalysis and the redesign of LOKI
    Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry
    Pages 36-50
  4. The data base of selected permutations
    Jun-Hui Yang, Zong-Duo Dai, Ken-Cheng Zeng
    Pages 73-81
  5. How to construct a family of strong one way permutations
    Babak Sadeghiyan, Yuliang Zheng, Josef Pieprzyk
    Pages 97-110
  6. On claw free families
    Wakaha Ogata, Kaoru Kurosawa
    Pages 111-123
  7. Sibling intractable function families and their applications
    Yuliang Zheng, Thomas Hardjono, Josef Pieprzyk
    Pages 124-138
  8. A digital multisignature scheme based on the Fiat-Shamir scheme
    Kazuo Ohta, Tatsuaki Okamoto
    Pages 139-148
  9. A generalized secret sharing scheme with cheater detection
    Hung-Yu Lin, Lein Harn
    Pages 149-158
  10. Generalized threshold cryptosystems
    Chi Sung Laih, Lein Harn
    Pages 159-166
  11. Feistel type authentication codes
    Reihaneh Safavi-Naini
    Pages 167-178
  12. Research activities on cryptology in korea
    Man Y. Rhee
    Pages 179-193
  13. A construction of a cipher from a single pseudorandom permutation
    Shimon Even, Yishay Mansour
    Pages 210-224
  14. Optimal perfect randomizers
    Josef Pieprzyk, Babak Sadeghiyan
    Pages 225-236

About these proceedings


This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DES-like cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers - foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers - foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session.


Computer Security Computersicherheit Cryptology DES Data Security Datensicherheit Hashing Public Key Cryptography Public-Key Kryptographie Secure Protocols Sichere Protokolle

Bibliographic information

  • Copyright Information Springer-Verlag 1993
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-57332-6
  • Online ISBN 978-3-540-48066-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349