Book Volume 917 1995

Advances in Cryptology — ASIACRYPT'94

4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings


ISBN: 978-3-540-59339-3 (Print) 978-3-540-49236-8 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Chapter

    Pages 1-17

    Multifeature security through homomorphic encryption

  3. Chapter

    Pages 19-32

    Multiplicative non-abelian sharing schemes and their application to threshold cryptography

  4. Chapter

    Pages 33-41

    Lower bound on the size of shares of nonperfect secret sharing schemes

  5. Chapter

    Pages 42-54

    On sharing many secrets

  6. Chapter

    Pages 55-64

    Combinatorial interpretation of secret sharing schemes

  7. Chapter

    Pages 65-79

    A correlation attack on the binary sequence generators with time-varying output function

  8. Chapter

    Pages 80-90

    On the linear complexity of nonlinearly filtered PN-sequences

  9. Chapter

    Pages 91-103

    Intrinsic statistical weakness of keystream generators

  10. Chapter

    Pages 105-118

    Semi-bent functions

  11. Chapter

    Pages 119-132

    Structures of cryptographic functions with strong avalanche characteristics

  12. Chapter

    Pages 133-150

    Formal verification of cryptographic protocols: A survey

  13. Chapter

    Pages 151-163

    Efficient electronic money

  14. Chapter

    Pages 164-170

    How to prevent buying of votes in computer elections

  15. Chapter

    Pages 171-181

    Design and analysis of key exchange protocols via secure channel identification

  16. Chapter

    Pages 182-192

    Zero-knowledge proofs of computational power in the shared string model

  17. Chapter

    Pages 193-208

    Information security aspects of spread spectrum systems

  18. Chapter

    Pages 209-223

    Combinatorial structure of A-codes with r-fold security

  19. Chapter

    Pages 224-237

    Meta-Message recovery and Meta-Blind signature schemes based on the discrete logarithm problem and their applications

  20. Chapter

    Pages 238-248

    A digital signature scheme based on linear error-correcting block codes

  21. Chapter

    Pages 249-259

    Secure acceleration of DSS signatures using insecure server

previous Page of 2