Advances in Cryptology — CRYPT0’ 95

15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27–31, 1995 Proceedings

Editors:

ISBN: 978-3-540-60221-7 (Print) 978-3-540-44750-4 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. MAC and Hash

    1. Book Chapter

      Pages 1-14

      MDx-MAC and Building Fast MACs from Hash Functions

    2. Book Chapter

      Pages 15-28

      XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions

    3. Book Chapter

      Pages 29-42

      Bucket Hashing and its Application to Fast Message Authentication

  2. Number Theory I

    1. Book Chapter

      Pages 43-56

      Fast Key Exchange with Elliptic Curve Systems

    2. Book Chapter

      Pages 57-69

      Fast Server-Aided RSA Signatures Secure Against Active Attacks

    3. Book Chapter

      Pages 70-83

      Security and Performance of Server-Aided RSA Computation Protocols

  3. Oblivious Transfer

    1. Book Chapter

      Pages 84-96

      Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver

    2. Book Chapter

      Pages 97-109

      Precomputing Oblivious Transfer

    3. Book Chapter

      Pages 110-123

      Committed Oblivious Transfer and Private Multi-Party Computation

    4. Book Chapter

      Pages 124-135

      On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols

  4. Cryptanalysis I

    1. Book Chapter

      Pages 136-147

      How to Break Shamir’s Asymmetric Basis

    2. Book Chapter

      Pages 148-156

      On the Security of the Gollmann Cascades

    3. Book Chapter

      Pages 157-170

      Improving the Search Algorithm for the Best Linear Expression

    4. Book Chapter

      Pages 171-184

      On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm

  5. Key Escrow

    1. Book Chapter

      Pages 185-196

      A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Key Escrow Systems

    2. Book Chapter

      Pages 197-207

      A Key Escrow System with Warrant Bounds

    3. Book Chapter

      Pages 208-221

      Fair Cryptosystems, Revisited

    4. Book Chapter

      Pages 222-235

      Escrow Encryption Systems Visited: Attacks, Analysis and Designs

  6. Protocols

    1. Book Chapter

      Pages 236-247

      Robustness Principles for Public Key Protocols

  7. Cryptanalysis II

    1. Book Chapter

      Pages 248-261

      Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88

previous Page of 2