Advances in Cryptology — ASIACRYPT'94

4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings

Editors:

ISBN: 978-3-540-59339-3 (Print) 978-3-540-49236-8 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. No Access

    Book Chapter

    Pages 1-17

    Multifeature security through homomorphic encryption

  2. No Access

    Book Chapter

    Pages 19-32

    Multiplicative non-abelian sharing schemes and their application to threshold cryptography

  3. No Access

    Book Chapter

    Pages 33-41

    Lower bound on the size of shares of nonperfect secret sharing schemes

  4. No Access

    Book Chapter

    Pages 42-54

    On sharing many secrets

  5. No Access

    Book Chapter

    Pages 55-64

    Combinatorial interpretation of secret sharing schemes

  6. No Access

    Book Chapter

    Pages 65-79

    A correlation attack on the binary sequence generators with time-varying output function

  7. No Access

    Book Chapter

    Pages 80-90

    On the linear complexity of nonlinearly filtered PN-sequences

  8. No Access

    Book Chapter

    Pages 91-103

    Intrinsic statistical weakness of keystream generators

  9. No Access

    Book Chapter

    Pages 105-118

    Semi-bent functions

  10. No Access

    Book Chapter

    Pages 119-132

    Structures of cryptographic functions with strong avalanche characteristics

  11. No Access

    Book Chapter

    Pages 133-150

    Formal verification of cryptographic protocols: A survey

  12. No Access

    Book Chapter

    Pages 151-163

    Efficient electronic money

  13. No Access

    Book Chapter

    Pages 164-170

    How to prevent buying of votes in computer elections

  14. No Access

    Book Chapter

    Pages 171-181

    Design and analysis of key exchange protocols via secure channel identification

  15. No Access

    Book Chapter

    Pages 182-192

    Zero-knowledge proofs of computational power in the shared string model

  16. No Access

    Book Chapter

    Pages 193-208

    Information security aspects of spread spectrum systems

  17. No Access

    Book Chapter

    Pages 209-223

    Combinatorial structure of A-codes with r-fold security

  18. No Access

    Book Chapter

    Pages 224-237

    Meta-Message recovery and Meta-Blind signature schemes based on the discrete logarithm problem and their applications

  19. No Access

    Book Chapter

    Pages 238-248

    A digital signature scheme based on linear error-correcting block codes

  20. No Access

    Book Chapter

    Pages 249-259

    Secure acceleration of DSS signatures using insecure server

previous Page of 2