Advances in Cryptology — ASIACRYPT '96

International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings

Editors:

ISBN: 978-3-540-61872-0 (Print) 978-3-540-70707-3 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-14

    A message recovery signature scheme equivalent to DSA over elliptic curves

  3. No Access

    Book Chapter

    Pages 15-25

    Cryptographic protocols based on real-quadratic A-fields (extended abstract)

  4. No Access

    Book Chapter

    Pages 26-35

    Minding your p's and q's

  5. No Access

    Book Chapter

    Pages 36-49

    Authenticated multi-party key agreement

  6. No Access

    Book Chapter

    Pages 50-56

    Cryptography and the internet: Lessons and challenges

  7. No Access

    Book Chapter

    Pages 57-64

    Generating standard DSA signatures without long inversion

  8. No Access

    Book Chapter

    Pages 65-76

    A fast software implementation for arithmetic operations in GF(2n)

  9. No Access

    Book Chapter

    Pages 77-90

    Hash functions based on block ciphers and quaternary codes

  10. No Access

    Book Chapter

    Pages 91-104

    Generalized Feistel networks

  11. No Access

    Book Chapter

    Pages 105-115

    On applying linear cryptanalysis to IDEA

  12. No Access

    Book Chapter

    Pages 116-124

    A multi-recastable ticket scheme for electronic elections

  13. No Access

    Book Chapter

    Pages 125-132

    Some remarks on a receipt-free and universally verifiable Mix-type voting scheme

  14. No Access

    Book Chapter

    Pages 133-144

    Observations on non-repudiation

  15. No Access

    Book Chapter

    Pages 145-158

    On the efficiency of one-time digital signatures

  16. No Access

    Book Chapter

    Pages 159-172

    A hidden cryptographic assumption in no-transferable indentification schemes

  17. No Access

    Book Chapter

    Pages 173-184

    Electronic money and key management from global and regional points of view

  18. No Access

    Book Chapter

    Pages 185-195

    Limiting the visible space visual secret sharing schemes and their application to human identification

  19. No Access

    Book Chapter

    Pages 196-209

    Towards characterizing when information-theoretic secret key agreement is possible

  20. No Access

    Book Chapter

    Pages 210-217

    Key sharing based on the wire-tap channel type II concept with noisy main channel

  21. No Access

    Book Chapter

    Pages 218-231

    Generalization of higher order SAC to vector output Boolean functions

previous Page of 2