Advances in Cryptology — ASIACRYPT '91

International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings

Editors:

ISBN: 978-3-540-57332-6 (Print) 978-3-540-48066-2 (Online)

Table of contents (46 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-21

    The transition from mechanisms to electronic computers, 1940 to 1950

  3. No Access

    Book Chapter

    Pages 22-35

    Cryptanalysis of LOKI

  4. No Access

    Book Chapter

    Pages 36-50

    Improving resistance to differential cryptanalysis and the redesign of LOKI

  5. No Access

    Book Chapter

    Pages 51-58

    A method to estimate the number of ciphertext pairs for differential cryptanalysis

  6. No Access

    Book Chapter

    Pages 59-72

    Construction of DES-like S-boxes based on Boolean functions satisfying the SAC

  7. No Access

    Book Chapter

    Pages 73-81

    The data base of selected permutations

  8. No Access

    Book Chapter

    Pages 82-96

    A framework for the design of one-way hash functions including cryptanalysis of Damgård's one-way function based on a cellular automaton

  9. No Access

    Book Chapter

    Pages 97-110

    How to construct a family of strong one way permutations

  10. No Access

    Book Chapter

    Pages 111-123

    On claw free families

  11. No Access

    Book Chapter

    Pages 124-138

    Sibling intractable function families and their applications

  12. No Access

    Book Chapter

    Pages 139-148

    A digital multisignature scheme based on the Fiat-Shamir scheme

  13. No Access

    Book Chapter

    Pages 149-158

    A generalized secret sharing scheme with cheater detection

  14. No Access

    Book Chapter

    Pages 159-166

    Generalized threshold cryptosystems

  15. No Access

    Book Chapter

    Pages 167-178

    Feistel type authentication codes

  16. No Access

    Book Chapter

    Pages 179-193

    Research activities on cryptology in korea

  17. No Access

    Book Chapter

    Pages 194-209

    On necessary and sufficient conditions for the construction of super pseudorandom permutations

  18. No Access

    Book Chapter

    Pages 210-224

    A construction of a cipher from a single pseudorandom permutation

  19. No Access

    Book Chapter

    Pages 225-236

    Optimal perfect randomizers

  20. No Access

    Book Chapter

    Pages 237-246

    A general purpose technique for locating key scheduling weaknesses in DES-like cryptosystems

  21. No Access

    Book Chapter

    Pages 247-252

    Results of switching-closure-test on FEAL

previous Page of 3