Advances in Cryptology — EUROCRYPT ’88

Workshop on the Theory and Application of Cryptographic Techniques Davos, Switzerland, May 25–27, 1988 Proceedings

  • D. Barstow
  • W. Brauer
  • P. Brinch Hansen
  • D. Gries
  • D. Luckham
  • C. Moler
  • A. Pnueli
  • G. Seegmüller
  • J. Stoer
  • N. Wirth
  • Christoph G. Günther
Conference proceedings EUROCRYPT 1988

Part of the Lecture Notes in Computer Science book series (LNCS, volume 330)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Key Distribution

  3. Authentication

  4. Signatures

  5. Protocols

    1. G. Agnew, R. Mullin, S. Vanstone
      Pages 159-166
    2. Jørgen Brandt, Ivan Bjerre Damgård, Peter Landrock
      Pages 167-176
    3. George I. Davida, Yvo G. Desmedt
      Pages 183-188
  6. Complexity and Number Theory

  7. Numerical Methods

    1. James A. Davis, Diane B. Holdridge
      Pages 235-243
    2. Shin-ichi Kawamura, Kyoko Hirano
      Pages 245-250
    3. G. B. Agnew, R. C. Mullin, S. A. Vanstone
      Pages 251-255
    4. Frank Hoornaert, Marc Decroos, Joos Vandewalle, René Govaerts
      Pages 257-264
  8. Cryptanalysis

    1. Brigitte Vallée, Marc Girault, Philippe Toffin
      Pages 281-291
    2. Bert den Boer
      Pages 293-299
    3. Willi Meier, Othmar Staffelbach
      Pages 301-314
  9. Running-Key Ciphers

  10. Cipher Theory and Threshold

  11. New Ciphers

  12. Back Matter
    Pages 469-473

About these proceedings


The International .4ssociation for Cryptologic Research (1.4CR) organizes tmo - ternational conferences every year, one in Europe and one in the 1-nited States. EUROCRYI’T’88. held in the beautiful environment of the S\~isb mountains in Davos, was the sixth European conference. The number of contributions and of participants at the meeting has increased substantiall!.. which is an indication of the high interest in cryptography and system security in general. The interest has not only increased but has also further moved towards - thentication. signatures and other protocols. This is easy to understand in view of the urgent needs for such protocols, in particular in connection with open - formation systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, 2.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems. was however also well represented and several significant results mere communicated. The present proceedings contain all contributions which were accepted for presentation. The chapters correspond to the sessions at the conference.


anonymity authentication complexity cryptoanalysis cryptography cryptology cryptosystem encryption key distribution privacy

Editors and affiliations

  • D. Barstow
  • W. Brauer
  • P. Brinch Hansen
  • D. Gries
  • D. Luckham
  • C. Moler
  • A. Pnueli
  • G. Seegmüller
  • J. Stoer
  • N. Wirth
  • Christoph G. Günther
    • 1
  1. 1.Asea Brown BoveriCorporate ResearchBadenSwitzerland

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 1988
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-50251-7
  • Online ISBN 978-3-540-45961-3
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site