Advances in Cryptology — CRYPTO’ 93

13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings

Editors:

ISBN: 978-3-540-57766-9 (Print) 978-3-540-48329-8 (Online)

Table of contents (40 chapters)

previous Page of 2
  1. Cryptosystems

    1. Book Chapter

      Pages 1-12

      Efficient Signature Schemes Based on Birational Permutations

    2. Book Chapter

      Pages 13-21

      A new identification scheme based on syndrome decoding

    3. Book Chapter

      Pages 22-39

      The Shrinking Generator

  2. Stream Ciphers and Cryptographic Functions

    1. Book Chapter

      Pages 40-48

      An Integrity Check Value Algorithm for Stream Ciphers

    2. Book Chapter

      Pages 49-60

      Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics

  3. Proof Systems and Zero-knowledge

    1. Book Chapter

      Pages 61-72

      A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity

    2. Book Chapter

      Pages 73-84

      Secret Sharing and Perfect Zero Knowledge

    3. Book Chapter

      Pages 85-99

      One Message Proof Systems with Known Space Verifiers

    4. Book Chapter

      Pages 100-109

      Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions

  4. Secret Sharing

    1. Book Chapter

      Pages 110-125

      Fully Dynamic Secret Sharing Schemes

    2. Book Chapter

      Pages 126-135

      Multisecret Threshold Schemes

    3. Book Chapter

      Pages 136-146

      Secret Sharing Made Short

  5. Number Theory and Algorithms

    1. Book Chapter

      Pages 147-158

      A Subexponential Algorithm for Discrete Logarithms over All Finite Fields

    2. Book Chapter

      Pages 159-165

      An implementation of the general number field sieve

    3. Book Chapter

      Pages 166-174

      On the factorization of RSA-120

    4. Book Chapter

      Pages 175-186

      Comparison of three modular reduction functions

  6. Differential Cryptanalysis

    1. Book Chapter

      Pages 187-199

      Differential Cryptanalysis of Lucifer

    2. Book Chapter

      Pages 200-211

      Differential Attack on Message Authentication Codes

    3. Book Chapter

      Pages 212-223

      Cryptanalysis of the CFB mode of the DES with a reduced number of rounds

    4. Book Chapter

      Pages 224-231

      Weak Keys for IDEA

previous Page of 2