Table of contents (47 papers)

  1. Front Matter
  2. Visual cryptography
    Moni Naor, Adi Shamir
    Pages 1-12
  3. The size of a share must be large
    László Csirmaz
    Pages 13-22
  4. On the dealer's randomness required in secret sharing schemes
    C. Blundo, A. Giorgio Gaggia, D. R. Stinson
    Pages 35-46
  5. A practical attack against knapsack based hash functions
    Antoine Joux, Louis Granboulan
    Pages 58-66
  6. The blinding of weak signatures
    Matthew Franklin, Moti Yung
    Pages 67-76
  7. Can D.S.A. be improved? — Complexity trade-offs with the digital signature standard —
    David Naccache, David M'RaÏhi, Serge Vaudenay, Dan Raphaeli
    Pages 77-85
  8. Designated confirmer signatures
    David Chaum
    Pages 86-91
  9. Optimal asymmetric encryption
    Mihir Bellare, Phillip Rogaway
    Pages 92-111
  10. Parallel divertibility of proofs of knowledge
    L. Chen, I. B. Damgård, T. P. Pedersen
    Pages 140-155
  11. Methodology for digital money based on general cryptographic tools
    Stefano D'Amiano, Giovanni Di Crescenzo
    Pages 156-170
  12. New group signature schemes
    L. Chen, T. P. Pedersen
    Pages 171-181
  13. The self-shrinking generator
    Willi Meier, Othmar Staffelbach
    Pages 205-214

About these proceedings

Introduction

This book constitutes the proceedings of the 1994 Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT '94, held in Perugia, Italy in May 1994.
The 36 revised full papers presented in the book are selected from 137 submissions and address all current research and advanced applicational aspects of cryptography; in addition, there are 11 short papers originating from the best special presentations accepted for the traditional rump session. The papers are organized in sections on secret sharing, hash functions, signatures, cryptosystems, pseudorandom generators, authentication codes, key agreement and key distribution, protocols, cryptanalysis and block ciphers, and number theory and algorithms.

Keywords

Communication Protocols Cryptoanalysis Cryptosystems Data Security Datensicherheit Kommunikationsprotokolle Kryptoanalysis Kryptosysteme Systems Security Systemsicherheit algorithms cryptography

Bibliographic information

  • Copyright Information Springer-Verlag 1995
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-60176-0
  • Online ISBN 978-3-540-44717-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349