Book Volume 921 1995

Advances in Cryptology — EUROCRYPT ’95

International Conference on the Theory and Application of Cryptographic Techniques Saint-Malo, France, May 21–25, 1995 Proceedings


ISBN: 978-3-540-59409-3 (Print) 978-3-540-49264-1 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XIV

  2. Cryptanalysis

    1. Chapter

      Pages 1-12

      Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction

    2. Chapter

      Pages 13-23

      Convergence in Differential Distributions

    3. Chapter

      Pages 24-38

      A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma

  3. Signatures

    1. Chapter

      Pages 39-49

      On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity

    2. Chapter

      Pages 50-63

      Verifiable Signature Sharing

    3. Chapter

      Pages 64-78

      Server(Prover/Signer)-Aided Verification of Identity Proofs and Signatures

  4. Number Theory

    1. Chapter

      Pages 79-94

      Counting the number of points on elliptic curves over finite fields: strategies and performances

    2. Chapter

      Pages 95-105

      An Implementation of the General Number Field Sieve to Compute Discrete Logarithms mod p

    3. Chapter

      Pages 106-120

      A Block Lanczos Algorithm for Finding Dependencies over GF(2)

  5. Protocol Aspects

    1. Chapter

      Pages 121-132

      How to Break Another “Provably Secure” Payment System

    2. Chapter

      Pages 133-146

      Quantum Oblivious Mutual Identification

    3. Chapter

      Pages 147-157

      Securing Traceability of Ciphertexts — Towards a Secure Software Key Escrow System

    4. Chapter

      Pages 158-167

      Secure Multiround Authentication Protocols

  6. Secret Sharing

    1. Chapter

      Pages 168-182

      Verifiable Secret Sharing as Secure Computation

    2. Chapter

      Pages 183-193

      Efficient Secret Sharing Without a Mutually Trusted Authority

    3. Chapter

      Pages 194-208

      General Short Computational Secret Sharing Schemes

  7. Electronic Cash

    1. Chapter

      Pages 209-219

      Fair Blind Signatures

    2. Chapter

      Pages 220-230

      Ripping Coins for a Fair Exchange

    3. Chapter

      Pages 231-247

      Restrictive Binding of Secret-Key Certificates

  8. Shift Registers and Boolean Functions

    1. Chapter

      Pages 248-262

      Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers

previous Page of 2