Table of contents (36 papers)

  1. Front Matter
  2. Multiplicative non-abelian sharing schemes and their application to threshold cryptography
    Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester
    Pages 19-32
  3. On sharing many secrets
    Wen -Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Pages 42-54
  4. Combinatorial interpretation of secret sharing schemes
    Kaoru Kurosawa, Koji Okada
    Pages 55-64
  5. On the linear complexity of nonlinearly filtered PN-sequences
    Amparo Fúster-Sabater, Pino Caballero-Gil
    Pages 80-90
  6. Semi-bent functions
    Seongtaek Chee, Sangjin Lee, Kwangjo Kim
    Pages 105-118
  7. Structures of cryptographic functions with strong avalanche characteristics
    Jennifer Seberry, Xian -Mo Zhang, Yuliang Zheng
    Pages 119-132
  8. Formal verification of cryptographic protocols: A survey
    Catherine A. Meadows, Catherine A. Meadows
    Pages 133-150
  9. Efficient electronic money
    Yacov Yacobi
    Pages 151-163
  10. How to prevent buying of votes in computer elections
    Valtteri Niemi, Ari Renvall
    Pages 164-170
  11. Zero-knowledge proofs of computational power in the shared string model
    Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano
    Pages 182-192
  12. Combinatorial structure of A-codes with r-fold security
    R. Safavi-Naini, L. Tombak
    Pages 209-223
  13. A digital signature scheme based on linear error-correcting block codes
    Mohssen Alabbadi, Stephen B. Wicker
    Pages 238-248

About these proceedings


This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994.
Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms.


authentication cryptoanalysis cryptography cryptology digital signature hash function secret sharing

Bibliographic information

  • Copyright Information Springer-Verlag 1995
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-59339-3
  • Online ISBN 978-3-540-49236-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349