Advances in Cryptology — CRYPTO’ 93

13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings

  • Douglas R. Stinson
Conference proceedings CRYPTO 1993

DOI: 10.1007/3-540-48329-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 773)

Table of contents

  1. Front Matter
    Pages I-X
  2. Cryptosystems

    1. Don Coppersmith, Hugo Krawczyk, Yishay Mansour
      Pages 22-39
  3. Stream Ciphers and Cryptographic Functions

  4. Proof Systems and Zero-knowledge

  5. Secret Sharing

    1. C. Blundo, A. Cresti, A. De Santis, U. Vaccaro
      Pages 110-125
    2. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe
      Pages 126-135
    3. Hugo Krawczyk
      Pages 136-146
  6. Number Theory and Algorithms

    1. Leonard M. Adleman, Jonathan DeMarrais
      Pages 147-158
    2. J. Buchmann, J. Loho, J. Zayer
      Pages 159-165
    3. T. Denny, B. Dodson, A. K. Lenstra, M. S. Manasse
      Pages 166-174
    4. Antoon Bosselaers, René Govaerts, Joos Vandewalle
      Pages 175-186
  7. Differential Cryptanalysis

    1. Ishai Ben-Aroya, Eli Biham
      Pages 187-199
    2. Kazuo Ohta, Mitsuru Matsui
      Pages 200-211
    3. Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens
      Pages 212-223

About these proceedings

Introduction

The CRYPTO ’93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee. It took place at the University of California, Santa Barbara, from August 22-26, 1993. This was the thirteenth annual CRYPTO conference, all of which have been held at UCSB. The conference was very enjoyable and ran very of the General Chair, Paul Van Oorschot. smoothly, largely due to the efforts It was a pleasure working with Paul throughout the months leading up to the conference. There were 136 submitted papers which were considered by the Program Committee. Of these, 38 were selected for presentation at the conference. There was also one invited talk at the conference, presented by Miles Smid, the title of which was “A Status Report On the Federal Government Key Escrow System.” The conference also included the customary Rump Session, which was presided over by Whit Diffie in his usual inimitable fashion. Thanks again to Whit for organizing and running the Rump session. This year, the Rump Session included an interesting and lively panel discussion on issues pertaining to key escrowing. Those taking part were W. Diffie, J. Gilmore, S. Goldwasser, M. Hellman, A. Herzberg, S. Micali, R. Rueppel, G. Simmons and D. Weitzner.

Keywords

Datenverschlüsselung Hash-Funktionen Kodierungstheorie Kryptologie authentication coding theory complexity theory cryptanalysis cryptoanalysis cryptology cryptosystems encryption hash function hash functions secret sharing

Editors and affiliations

  • Douglas R. Stinson
    • 1
  1. 1.Computer Science and Engineering Department and Center for Communication and Information ScienceUniversity of NebraskaLincolnUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1994
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-57766-9
  • Online ISBN 978-3-540-48329-8
  • Series Print ISSN 0302-9743