Advances in Cryptology-CRYPT0’ 90

Proceedings

  • Alfred J. Menezes
  • Scott A. Vanstone
Part of the Lecture Notes in Computer Science book series (LNCS, volume 537)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Cryptanalysis

    1. Eli Biham, Adi Shamir
      Pages 2-21
    2. Henri Gilbert, Guy Chassé
      Pages 22-33
    3. Kencheng Zeng, C. H. Yang, T. R. N. Rao
      Pages 34-47
  3. Protocols

    1. Gilles Brassard, Claude Crépeau
      Pages 49-61
    2. D. Beaver, J. Feigenbaum, J. Kilian, P. Rogaway
      Pages 62-76
    3. Gilles Brassard, Moti Yung
      Pages 94-107
  4. Algebra and Number Theory

    1. B. A. LaMacchia, A. M. Odlyzko
      Pages 109-133
    2. Johannes Buchmann, Stephan Düllmann
      Pages 134-139
    3. Chih-Chwen Chuang, James George Dunham
      Pages 140-155
  5. Signatures and Authentication

    1. Joan Boyar, David Chaum, Ivan Damgård, Torben Pedersen
      Pages 189-205
    2. David Chaum, Sandra Roijakkers
      Pages 206-214
  6. Secret Sharing

  7. Key Distribution

    1. Yacov Yacobi
      Pages 268-273

About these proceedings

Introduction

Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of California at Santa Barbara. The conference was held from August 11 to August 15, 1990 and was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Department of Computer Science of the University of California at Santa Barbara. 227 participants from twenty countries around the world. Crypto '90 attracted Roughly 35% of attendees were from academia, 45% from industry and 20% from government. The program was intended to provide a balance between the purely theoretical and the purely practical aspects of cryptography to meet the needs and diversified interests of these various groups. The overall organization of the conference was superbly handled by the general chairperson Sherry McMahan. All of the outstanding features of Crypto, which we have come to expect over the years, were again present and, in addition to all of this, she did a magnificent job in the preparation of the book of abstracts. This is a crucial part of the program and we owe her a great deal of thanks.

Keywords

Datensicherheit Key Management Kryptoanalysis Public-Key Kryptosysteme Schlüsselverwaltung authentication cryptoanalysis cryptography cryptology cryptosystems data security digital signature encryption hash function secret sharing

Editors and affiliations

  • Alfred J. Menezes
    • 1
  • Scott A. Vanstone
    • 1
  1. 1.Department of Combinatorics and OptimizationUniversity of WaterlooWaterlooCanada

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-38424-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 1991
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-54508-8
  • Online ISBN 978-3-540-38424-3
  • Series Print ISSN 0302-9743
  • About this book