Advances in Cryptology — CRYPTO ’96

16th Annual International Cryptology Conference Santa Barbara, California, USA August 18–22, 1996 Proceedings

  • Neal Koblitz
Conference proceedings CRYPTO 1996

DOI: 10.1007/3-540-68697-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1109)

Table of contents (30 papers)

  1. Front Matter
    Pages I-XII
  2. Hashing and Authentication I

    1. Keying Hash Functions for Message Authentication
      Mihir Bellare, Ran Canetti, Hugo Krawczyk
      Pages 1-15
    2. Universal Hashing and Multiple Authentication
      M. Atici, D. R. Stinson
      Pages 16-30
  3. New Systems

  4. Asymmetric Systems

  5. Hard Bits

  6. Signatures

    1. Robust and Efficient Sharing of RSA Functions
      Rosario Gennaro, Stanisław Jarecki, Hugo Krawczyk, Tal Rabin
      Pages 157-172
    2. New Generation of Secure and Practical RSA-Based Signatures
      Ronald Cramer, Ivan Damgård
      Pages 173-185
  7. Zero Knowledge

  8. Symmetric Systems

    1. Improved Differential Attacks on RC5
      Lars R. Knudsen, Willi Meier
      Pages 216-228
    2. Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude
      Paul C. van Oorschot, Michael J. Wiener
      Pages 229-236
  9. More on Symmetric Systems

    1. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
      John Kelsey, Bruce Schneier, David Wagner
      Pages 237-251

About these proceedings

Introduction

Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and P- vacy and the Computer Science Department of the University of California at Santa Barbara (UCSB). It takes place at UCSB from August 18 to 22, 1996. The General Chair, Richard Graveman, is responsible for local organization and registration. The scientific program was organized by the 16-member Program C- mittee. We considered 115 papers. (An additional 15 submissions had to be summarily rejected because of lateness or major noncompliance with the c- ditions in the Call for Papers.) Of these, 30 were accepted for presentation. In addition, there will be five invited talks by Ernest Brickell. Andrew Clark, Whitfield Diffie, Ronald Rivest, and Cliff Stoll. A Rump Session will be chaired by Stuart Haber. These proceedings contain the revised versions of the 30 contributed talks. least three com- The submitted version of each paper was examined by at mittee members and/or outside experts, and their comments were taken into account in the revisions. However, the authors (and not the committee) bear full responsibility for the content of their papers.

Keywords

Datenverschlüsselung Digitale Signaturen Kryptoanalyse Kryptographische Protokolle Quatencryptographi authentication cryptoanalysis cryptographic protocol cryptography cryptology data encryption digital signature digital signatures encryption

Editors and affiliations

  • Neal Koblitz
    • 1
  1. 1.Department of Mathematics SeattleUniversity of WashingtonWashingtonUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1996
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-61512-5
  • Online ISBN 978-3-540-68697-2
  • Series Print ISSN 0302-9743