Book Volume 1109 1996

Advances in Cryptology — CRYPTO ’96

16th Annual International Cryptology Conference Santa Barbara, California, USA August 18–22, 1996 Proceedings


ISBN: 978-3-540-61512-5 (Print) 978-3-540-68697-2 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XII

  2. Hashing and Authentication I

    1. Chapter

      Pages 1-15

      Keying Hash Functions for Message Authentication

    2. Chapter

      Pages 16-30

      Universal Hashing and Multiple Authentication

    3. Chapter

      Pages 31-44

      Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings

  3. New Systems

    1. Chapter

      Pages 45-60

      Asymmetric Cryptography with a Hidden Monomial

    2. Chapter

      Pages 61-73

      Anonymous Communication and Anonymous Cash

  4. Asymmetric Systems

    1. Chapter

      Pages 74-82

      Weaknesses in Some Threshold Cryptosystems

    2. Chapter

      Pages 83-88

      Hidden Collisions on DSS

    3. Chapter

      Pages 89-103

      The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?

    4. Chapter

      Pages 104-113

      Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

  5. Hard Bits

    1. Chapter

      Pages 114-128

      All Bits in ax + b mod p are Hard

    2. Chapter

      Pages 129-142

      Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes

  6. Signatures

    1. Chapter

      Pages 143-156

      Security of 2t-Root Identification and Signatures

    2. Chapter

      Pages 157-172

      Robust and Efficient Sharing of RSA Functions

    3. Chapter

      Pages 173-185

      New Generation of Secure and Practical RSA-Based Signatures

  7. Zero Knowledge

    1. Chapter

      Pages 186-200

      Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers

    2. Chapter

      Pages 201-215

      Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing

  8. Symmetric Systems

    1. Chapter

      Pages 216-228

      Improved Differential Attacks on RC5

    2. Chapter

      Pages 229-236

      Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude

  9. More on Symmetric Systems

    1. Chapter

      Pages 237-251

      Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES

    2. Chapter

      Pages 252-267

      How to Protect DES Against Exhaustive Key Search

previous Page of 2