Book Volume 658 1993

Advances in Cryptology — EUROCRYPT’ 92

Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24–28, 1992 Proceedings


ISBN: 978-3-540-56413-3 (Print) 978-3-540-47555-2 (Online)

Table of contents (45 chapters)

previous Page of 3
  1. Front Matter

    Pages i-x

  2. Secret Sharing

    1. Chapter

      Pages 1-24

      Graph Decompositions and Secret Sharing Schemes

    2. Chapter

      Pages 25-34

      Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups

  3. Hash Functions

    1. Chapter

      Pages 35-44

      F.F.T. Hashing is not Collision-free

    2. Chapter

      Pages 45-54

      FFT-Hash II, Efficient Cryptographic Hashing

    3. Chapter

      Pages 55-70

      Hash Functions Based on Block Ciphers

    4. Chapter

      Pages 71-80

      Differential Cryptanalysis Mod 232 with Applications to MD5

  4. Block Ciphers

    1. Chapter

      Pages 81-91

      A New Method for Known Plaintext Attack of FEAL Cipher

    2. Chapter

      Pages 92-98

      On the construction of highly nonlinear permutations

    3. Chapter

      Pages 99-112

      The One-Round Functions of the DES Generate the Alternating Group

  5. Stream Ciphers

    1. Chapter

      Pages 113-123

      Correlation Via Linear Sequential Circuit Approximation of Combiners with Memory

    2. Chapter

      Pages 124-137

      Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift Register Sequence

    3. Chapter

      Pages 138-152

      Suffix trees and string complexity

  6. Public Key I

    1. Chapter

      Pages 153-162

      Attacks on Protocols for Server-Aided RSA Computation

    2. Chapter

      Pages 163-173

      Public-Key Cryptosystems with Very Small Key Lengths

    3. Chapter

      Pages 174-182

      Resource Requirements for the Application of Addition Chains in Modulo Exponentiation

  7. Factoring

    1. Chapter

      Pages 183-193

      Massively parallel elliptic curve factoring

  8. The Eurocrypt’92 Controversial Issue Trapdoor Primes and Moduli

    1. Chapter

      Pages 194-199

      The Eurocrypt’92 Controversial Issue Trapdoor Primes and Moduli

  9. Public Key II

    1. Chapter

      Pages 200-207

      Fast Exponentiation with Precomputation

    2. Chapter

      Pages 208-220

      Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications

    3. Chapter

      Pages 221-238

      High-Speed Implementation Methods for RSA Scheme

previous Page of 3