Advances in Cryptology 1981 – 1997

Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conferences 1981 – 1997

  • Kevin S. McCurley
  • Claus Dieter Ziegler

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1440)

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Conference Contents

    1. Front Matter
      Pages 1-1
    2. Allen Gersho
      Pages 3-8
    3. Thomas Beth
      Pages 9-12
    4. David Chaum, Ronald L. Rivest, Alan T. Sherman
      Pages 13-19
    5. Pages 21-21
    6. David Chaum
      Pages 23-27
    7. Thomas Beth, Norbert Cot, Ingemar Ingemarsson
      Pages 29-34
    8. G. R. Blakley, David Chaum
      Pages 35-40
    9. Franz Pichler
      Pages 41-47
    10. Hugh C. Williams
      Pages 49-54
    11. Ingemar Ingemarsson
      Pages 55-60
    12. A. M. Odlyzko
      Pages 61-67
    13. David Chaum, Wyn L. Price
      Pages 69-73
    14. Carl Pomerance
      Pages 75-80
    15. Christoph G. Günther
      Pages 81-86
    16. S. Goldwasser
      Pages 87-92
    17. J. -J. Quisquater, J. Vandewalle
      Pages 93-99
    18. G. Brassard
      Pages 101-109
    19. I. B. Damgård
      Pages 111-117
    20. A. J. Menezes, S. A. Vanstone
      Pages 119-125
    21. D. W. Davies
      Pages 127-133
    22. J. Feigenbaum
      Pages 135-139
    23. R. A. Rueppel
      Pages 141-146
    24. Ernest F. Brickell
      Pages 147-151
    25. Tor Helleseth
      Pages 153-158
    26. Douglas R. Stinson
      Pages 159-164
    27. Alfredo De Santis
      Pages 165-171
    28. Yvo G. Desmedt
      Pages 173-179
    29. Louis C. Guillou, Jean-Jacques Quisquater
      Pages 181-189
    30. Don Coppersmith
      Pages 191-197
    31. Ueli Maurer
      Pages 199-205
    32. Neal Koblitz
      Pages 207-213
    33. Walter Fumy
      Pages 215-221
    34. Burton S. Kaliski Jr.
      Pages 223-229
  3. Back Matter
    Pages 233-460

About this book


AboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was brought by the industrial revolution of the last century. From the beginning of time, information has been an important asset for humans. In the early days of humanexistence,themereknowledgeofwheretomosteasilygatherfoodwas the di?erence between life and death. Throughout history, information has provided the means for winning wars, making fortunes, and shaping history. The underlying theme of the information revolution is that we continue to ?nd new ways to use information. These new uses for information serve to highlight our need to protect di?erent aspects of information. Cryptology may be broadly de?ned as the scienti?c study of adversarial information protection. Cryptology has traditionally dealt with the co- dentiality of information, but innovation in using information produces new requirements for protection of that information. Some are longstanding and fundamental - how do we guarantee that information is ”authentic”? How do we guarantee that information is timely? How can we produce bits that have the same properties as ”money”? Each of these questions has been grappled with in the cryptologic research community.


Cryptanalysis Crypto Systems Cryptography DES Information Security Privacy cryptology

Editors and affiliations

  • Kevin S. McCurley
    • 1
  • Claus Dieter Ziegler
    • 2
  1. 1.IBM Almaden Research CenterSan JoseUSA
  2. 2.Abteilung Mathematik und InformatikFachinformationszentrum KarlsruheBerlinGermany

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 1998
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-65069-0
  • Online ISBN 978-3-540-49677-9
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site