Advances in Cryptology — EUROCRYPT ’97

International Conference on the Theory and Application of Cryptographic Techniques Konstanz, Germany, May 11–15, 1997 Proceedings


ISBN: 978-3-540-62975-7 (Print) 978-3-540-69053-5 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XI

  2. Block Ciphers

    1. Book Chapter

      Pages 1-13

      Two Attacks on Reduced IDEA

    2. Book Chapter

      Pages 14-26

      Combinatorial Properties of Basic Encryption Operations

  3. Public Key Systems

    1. Book Chapter

      Pages 27-36

      A New Public-Key Cryptosystem

    2. Book Chapter

      Pages 37-51

      On the Importance of Checking Cryptographic Protocols for Faults

    3. Book Chapter

      Pages 52-61

      Lattice Attacks on NTRU

  4. Protocols

    1. Book Chapter

      Pages 62-74

      Kleptography: Using Cryptography Against Cryptography

    2. Book Chapter

      Pages 75-87

      Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation

    3. Book Chapter

      Pages 88-102

      Anonymous Fingerprinting

    4. Book Chapter

      Pages 103-118

      A Secure and Optimally Efficient Multi-Authority Election Scheme

  5. Key Escrow

    1. Book Chapter

      Pages 119-133

      Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals

    2. Book Chapter

      Pages 134-148

      The GCHQ Protocol and Its Problems

  6. Hash-Functions

    1. Book Chapter

      Pages 149-162

      Bucket Hashing with a Small Key Size

    2. Book Chapter

      Pages 163-192

      A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost

  7. Information Theory

    1. Book Chapter

      Pages 193-208

      Smooth Entropy and Rényi Entropy

    2. Book Chapter

      Pages 209-225

      Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion

  8. Stream Ciphers

    1. Book Chapter

      Pages 226-238

      Linear Statistical Weakness of Alleged RC4 Keystream Generator

    2. Book Chapter

      Pages 239-255

      Cryptanalysis of Alleged A5 Stream Cipher

  9. Complexity Theory

    1. Book Chapter

      Pages 256-266

      Lower Bounds for Discrete Logarithms and Related Problems

    2. Book Chapter

      Pages 267-279

      Stronger Security Proofs for RSA and Rabin Bits

    3. Book Chapter

      Pages 280-305

      Round-Optimal Zero-Knowledge Arguments Based on Any One-Way Function

previous Page of 2