Advances in Cryptology — EUROCRYPT ’97

International Conference on the Theory and Application of Cryptographic Techniques Konstanz, Germany, May 11–15, 1997 Proceedings

  • Walter Fumy
Conference proceedings EUROCRYPT 1997

DOI: 10.1007/3-540-69053-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1233)

Table of contents (34 papers)

  1. Front Matter
    Pages I-XI
  2. Block Ciphers

    1. Two Attacks on Reduced IDEA
      Johan Borst, Lars R. Knudsen, Vincent Rijmen
      Pages 1-13
  3. Public Key Systems

    1. A New Public-Key Cryptosystem
      David Naccache, Jacques Stern
      Pages 27-36
    2. On the Importance of Checking Cryptographic Protocols for Faults
      Dan Boneh, Richard A. DeMillo, Richard J. Lipton
      Pages 37-51
    3. Lattice Attacks on NTRU
      Don Coppersmith, Adi Shamir
      Pages 52-61
  4. Protocols

    1. Kleptography: Using Cryptography Against Cryptography
      Adam Young, Moti Yung
      Pages 62-74
    2. Anonymous Fingerprinting
      Birgit Pfitzmann, Michael Waidner
      Pages 88-102
    3. A Secure and Optimally Efficient Multi-Authority Election Scheme
      Ronald Cramer, Rosario Gennaro, Berry Schoenmakers
      Pages 103-118
  5. Key Escrow

    1. Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals
      Eric R. Verheul, Henk C. A. van Tilborg
      Pages 119-133
    2. The GCHQ Protocol and Its Problems
      Ross Anderson, Michael Roe
      Pages 134-148
  6. Hash-Functions

    1. Bucket Hashing with a Small Key Size
      Thomas Johansson
      Pages 149-162
    2. A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost
      Mihir Bellare, Daniele Micciancio
      Pages 163-192
  7. Information Theory

  8. Stream Ciphers

  9. Complexity Theory

About these proceedings


EUROCRYEVr '97, the 15th annual EUROCRYPT conference on the theory and application of cryptographic techniques, was organized and sponsored by the International Association for Cryptologic Research (IACR). The IACR organizes two series of international conferences each year, the EUROCRYPT meeting in Europe and CRWTO in the United States. The history of EUROCRYFT started 15 years ago in Germany with the Burg Feuerstein Workshop (see Springer LNCS 149 for the proceedings). It was due to Thomas Beth's initiative and hard work that the 76 participants from 14 countries gathered in Burg Feuerstein for the first open meeting in Europe devoted to modem cryptography. I am proud to have been one of the participants and still fondly remember my first encounters with some of the celebrities in cryptography. Since those early days the conference has been held in a different location in Europe each year (Udine, Paris, Linz, Linkoping, Amsterdam, Davos, Houthalen, Aarhus, Brighton, Balantonfiired, Lofthus, Perugia, Saint-Malo, Saragossa) and it has enjoyed a steady growth, Since the second conference (Udine, 1983) the IACR has been involved, since the Paris meeting in 1984, the name EUROCRYPT has been used. For its 15th anniversary, EUROCRYPT finally returned to Germany. The scientific program for EUROCRYPT '97 was put together by a 18-member program committee whch considered 104 high-quality submissions. These proceedings contain the revised versions of the 34 papers that were accepted for presentation. In addition, there were two invited talks by Ernst Bovelander and by Gerhard Frey.


Authentifikation Digitale Signatur Digitale Signaturen Kommunikationsprotokolle Kryptos Kryptosystem Public-Key Kryptosysteme authentication communication protocols cryptology digital signature digital signatures electronic commerce pbulic key crypto systems privacy

Editors and affiliations

  • Walter Fumy
    • 1
  1. 1.Corporate TechnologySiemens AGMunichGermany

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1997
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-62975-7
  • Online ISBN 978-3-540-69053-5
  • Series Print ISSN 0302-9743