Advances in Cryptology — CRYPTO’ 86

Proceedings

Editors:

ISBN: 978-3-540-18047-0 (Print) 978-3-540-47721-1 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. Data Encryption Standard

    1. Book Chapter

      Pages 3-8

      Structure in the S-Boxes of the DES (extended abstract)

    2. Book Chapter

      Pages 9-32

      Cycle Structure of the DES with Weak and Semi-Weak Keys

  2. Public-Key Cryptography

    1. Book Chapter

      Pages 35-48

      Private-Key Algebraic-Coded Cryptosystems

    2. Book Chapter

      Pages 49-59

      Some Variations on RSA Signatures & their Security

    3. Book Chapter

      Pages 60-63

      Breaking the Cade Cipher

    4. Book Chapter

      Pages 64-83

      A Modification of a Broken Public-Key Cipher

    5. Book Chapter

      Pages 84-103

      A Pseudo-Random Bit Generator Based on Elliptic Logarithms

    6. Book Chapter

      Pages 104-110

      Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme

    7. Book Chapter

      Pages 111-117

      Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?)

    8. Book Chapter

      Pages 118-167

      A Secure and Privacy-Protecting Protocol for Transmitting Personal Information Between Organizations

  3. Cryptographic Protocols And Zero-Knowledge Proofs

    1. Book Chapter

      Pages 171-185

      How to Prove All NP Statements in Zero-Knowledge and a Methodology of Cryptographic Protocol Design (Extended Abstract)

    2. Book Chapter

      Pages 186-194

      How To Prove Yourself: Practical Solutions to Identification and Signature Problems

    3. Book Chapter

      Pages 195-199

      Demonstrating that a Public Predicate can be Satisfied Without Revealing Any Information About How

    4. Book Chapter

      Pages 200-212

      Demonstrating Possession of a Discrete Logarithm Without Revealing it

    5. Book Chapter

      Pages 213-222

      Cryptographic Capsules: A Disjunctive Primitive for Interactive Protocols

    6. Book Chapter

      Pages 223-233

      Zero-Knowledge Simulation of Boolean Circuits

    7. Book Chapter

      Pages 234-238

      All-or-Nothing Disclosure of Secrets

    8. Book Chapter

      Pages 239-247

      A zero-knowledge Poker protocol that achieves confidentiality of the players’ strategy or How to achieve an electronic Poker face

  4. Secret-Sharing Methods

    1. Book Chapter

      Pages 251-260

      Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract)

    2. Book Chapter

      Pages 261-265

      How to Share a Secret with Cheaters

previous Page of 2