Skip to main content
  • Conference proceedings
  • © 1992

Advances in Cryptology — CRYPTO ’91

Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 576)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (38 papers)

  1. Front Matter

    Pages I-X
  2. Protocol Design and Analysis

    1. A Calculus for Access Control in Distributed Systems

      • M. Abadi, M. Burrows, B. Lampson, G. Plotkin
      Pages 1-23
    2. Systematic Design of Two-Party Authentication Protocols

      • Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva et al.
      Pages 44-61
  3. Combinatorics and Authentication

    1. Universal hashing and authentication codes

      • D. R. Stinson
      Pages 74-85
    2. On Correlation-immune functions

      • P. Camion, C. Carlet, P. Charpin, N. Sendrier
      Pages 86-100
  4. Secret Sharing and Information Theory

    1. On the Size of Shares for Secret Sharing Schemes

      • R. M. Capocelli, A. De Santis, L. Gargano, U. Vaccaro
      Pages 101-113
    2. On Verification in Secret Sharing

      • Cynthia Dwork
      Pages 114-128
    3. Multiparty Secret Key Exchange Using a Random Deal of Cards

      • Michael J. Fischer, Rebecca N. Wright
      Pages 141-155
  5. Cryptanalysis

    1. A Known Plaintext Attack of FEAL-4 and FEAL-6

      • Anne Tardy-Corfdir, Henri Gilbert
      Pages 172-182
    2. A switching closure test to analyze cryptosystems

      • Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi
      Pages 183-193
    3. An Attack on the Last Two Rounds of MD4

      • Bert den Boer, Antoon Bosselaers
      Pages 194-203
    4. The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

      • Yeow Meng Chee, Antoine Joux, Jacques Stern
      Pages 204-212
  6. Complexity Theory

    1. A One-Round, Two-Prover, Zero-Knowledge Protocol for NP

      • Dror Lapidot, Adi Shamir
      Pages 213-224
    2. Interactive Proofs with Space Bounded Provers

      • Joe Kilian, Ronitt Rubinfeld
      Pages 225-231

Editors and Affiliations

  • AT&T Bell Laboratories, Murray Hill, USA

    Joan Feigenbaum

Bibliographic Information

  • Book Title: Advances in Cryptology — CRYPTO ’91

  • Book Subtitle: Proceedings

  • Editors: Joan Feigenbaum

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/3-540-46766-1

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Springer Book Archive

  • Copyright Information: Springer-Verlag Berlin Heidelberg 1992

  • Softcover ISBN: 978-3-540-55188-1Published: 26 February 1992

  • eBook ISBN: 978-3-540-46766-3Published: 30 June 2003

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: X, 484

  • Topics: Cryptology

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access