Advances in Cryptology — EUROCRYPT'98

International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31 – June 4, 1998 Proceedings

Editors:

ISBN: 978-3-540-64518-4 (Print) 978-3-540-69795-4 (Online)

Table of contents (44 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Book Chapter

    Pages 1-16

    Securing threshold cryptosystems against chosen ciphertext attack

  3. Book Chapter

    Pages 17-31

    Auto-recoverable auto-certifiable cryptosystems

  4. Book Chapter

    Pages 32-46

    A practical and provably secure scheme for publicly verifiable secret sharing and its applications

  5. Book Chapter

    Pages 47-58

    Equivalence of counting the number of points on elliptic curve over the ring Zn and factoring n

  6. Book Chapter

    Pages 59-71

    Breaking RSA may not be equivalent to factoring

  7. Book Chapter

    Pages 72-84

    Lower bounds on generic algorithms in groups

  8. Book Chapter

    Pages 85-99

    Improved cryptanalysis of RC5

  9. Book Chapter

    Pages 100-111

    Cryptanalysis of the ANSI X9.52 CBCM mode

  10. Book Chapter

    Pages 112-126

    Differential-linear weak key classes of IDEA

  11. Book Chapter

    Pages 127-144

    Divertible protocols and atomic proxy cryptography

  12. Book Chapter

    Pages 145-157

    Optimum traitor tracing and asymmetric schemes

  13. Book Chapter

    Pages 158-170

    On finding small solutions of modular multivariate polynomial equations

  14. Book Chapter

    Pages 171-183

    Computing discrete logarithms with quadratic number rings

  15. Book Chapter

    Pages 184-200

    Improved algorithms for isomorphisms of polynomials

  16. Book Chapter

    Pages 201-210

    Visual cryptanalysis

  17. Book Chapter

    Pages 211-220

    How to improve an exponentiation black-box

  18. Book Chapter

    Pages 221-235

    Speeding up discrete log and factoring based schemes via precomputations

  19. Book Chapter

    Pages 236-250

    Fast batch verification for modular exponentiation and digital signatures

  20. Book Chapter

    Pages 251-265

    A formal treatment of remotely keyed encryption

  21. Book Chapter

    Pages 266-280

    Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible

previous Page of 3