Advances in Cryptology — ASIACRYPT’98

International Conference on the Theory and Application of Cryptology and Information Security Beijing, China, October 18–22, 1998 Proceedings

  • Kazuo Ohta
  • Dingyi Pei

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1514)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Public Key Cryptosystems

    1. Guillaume Poupard, Jacques Stern
      Pages 11-24
    2. Dan Boneh, Glenn Durfee, Yair Frankel
      Pages 25-34
    3. Jacques Patarin, Louis Goubin, Nicolas Courtois
      Pages 35-50
  3. Invited Talk

  4. Elliptic Curve Cryptosystems

    1. Henri Cohen, Atsuko Miyaji, Takatoshi Ono
      Pages 51-65
    2. Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
      Pages 66-79
    3. Jinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii
      Pages 95-109
    4. Joseph H. Silverman, Joe Suzuki
      Pages 110-125
  5. Cryptanalysis 1

    1. Hongjun Wu, Feng Bao, Robert H. Deng, Qin -Zhong Ye
      Pages 126-132
    2. Hongjun Wu, Feng Bao, Robert H. Deng, Qin -Zhong Ye
      Pages 133-147
  6. Signature

  7. Cryptanlysis 2

  8. Finite Automata

    1. Zong Duo Dai, Ding Feng Ye, Kwok Yan Lam
      Pages 227-241

About these proceedings

Introduction

ASIACRYPT’98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22. This is the fourth of the Asiacrypt conferences. ASIACRYPT’98 is sponsored by the State Key Laboratory of Information Security (SKLOIS), University of Science and Technology of China (USTC), and the Asiacrypt Steering Committee (ASC), in cooperation with the International Association for Cryptology Research (IACR). The 16-member Program Committee organized the scientific program and considered 118 submissions. Of these, 32 were accepted for presentation. The authors’ affiliations of the 118 submissions and the 32 accepted papers range over 18 and 13 countries or regions, respectively. The submitted version of each paper was sent to all members of the Program Committee and was extensively examined by at least three committee members and/or outside experts. The review process was rigorously blinded and the anonymity of each submission are maintained until the selection was completed. We followed the traditional policy that each member of the Program Committee could be an author of at most one accepted paper. These proceedings contain the revised versions of the 32 contributed talks as well as a short note written by one invited speaker. Comments from the Program Committee were taken into account in the revisions. However, the authors (not the committee) bear full responsibility for the contents of their papers.

Keywords

Cryptanalyis Cryptanalysis Digital Signatures Public-Key C authentication automata cryptoanalysis cryptographic protocol cryptography cryptology cryptosystems digital signature digital signature scheme information security information theory

Editors and affiliations

  • Kazuo Ohta
    • 1
  • Dingyi Pei
    • 2
  1. 1.NTT Information and Communication System Labs.KanagawaJapan
  2. 2.Graduate School of USTCSKLOISBeijingP.R. China

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-49649-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 1998
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-65109-3
  • Online ISBN 978-3-540-49649-6
  • Series Print ISSN 0302-9743
  • About this book