Advances in Cryptology — CRYPT0’ 95

15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27–31, 1995 Proceedings

  • Don Coppersmith

Part of the Lecture Notes in Computer Science book series (LNCS, volume 963)

Table of contents

  1. Front Matter
    Pages I-XII
  2. MAC and Hash

  3. Number Theory I

    1. Richard Schroeppel, Hilarie Orman, Sean O’Malley, Oliver Spatscheck
      Pages 43-56
    2. Philippe Béguin, Jean-Jacques Quisquater
      Pages 57-69
  4. Oblivious Transfer

  5. Cryptanalysis I

    1. Thorsten Theobald
      Pages 136-147
    2. Sang-Joon Park, Sang-Jin Lee, Seung-Cheol Goh
      Pages 148-156
    3. Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
      Pages 157-170
    4. Burton S. Kaliski Jr., Yiqun Lisa Yin
      Pages 171-184
  6. Key Escrow

  7. Protocols

    1. Ross Anderson, Roger Needham
      Pages 236-247

About these proceedings

Introduction

The Crypto ’95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. It took place at the University of California, Santa Barbara, from August 27-31, 1995. This was the fifteenth annual Crypto conference; all have been held at UCSB. For the second time, proceedings were available at the conference. The General Chair, Stafford Tavares, was responsible for local organization and registration. The Program Committee considered 151 papers and selected 36 for pres- tation. There were also two invited talks. Robert Morris, Sr. gave a talk on “Ways of Losing Information,” which included some non-cryptographic means of leaking secrets that are often overlooked by cryptographers. The second talk, “Cryptography - Myths and Realities,” was given by Adi Shamir, this year’s IACR Distinguished Lecturer. Shamir is the second person to receive this honor, the first having been Gus Simmons at Crypto ’94. These proceedings contain revised versions of the 36 contributed talks. Each paper was sent to at least three members of the program committee for c- ments. Revisions were not checked on their scientific aspects. Some authors will write final versions of their papers for publication in refereed journals. Of course, the authors bear full responsibility for the contents of their papers.

Keywords

Algorithmische Zahlentheorie Authentizität Cryptanalysis Key Escrow Kommunikationsprotokoll Kommunikationsprotokolle Kryptoanalysis Schlüsselhinterleg authentication communication protocols computational number theory cryptoanalysis cryptology

Editors and affiliations

  • Don Coppersmith
    • 1
  1. 1.IBM T.J. Watson Research CenterYorktown HeightsUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-44750-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 1995
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-60221-7
  • Online ISBN 978-3-540-44750-4
  • Series Print ISSN 0302-9743
  • About this book