Advances in Cryptology — EUROCRYPT ’88

Workshop on the Theory and Application of Cryptographic Techniques Davos, Switzerland, May 25–27, 1988 Proceedings

  • D. Barstow
  • W. Brauer
  • P. Brinch Hansen
  • D. Gries
  • D. Luckham
  • C. Moler
  • A. Pnueli
  • G. Seegmüller
  • J. Stoer
  • N. Wirth
  • Christoph G. Günther
Conference proceedings EUROCRYPT 1988
Part of the Lecture Notes in Computer Science book series (LNCS, volume 330)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Key Distribution

  3. Authentication

  4. Signatures

  5. Protocols

    1. G. Agnew, R. Mullin, S. Vanstone
      Pages 159-166
    2. Jørgen Brandt, Ivan Bjerre Damgård, Peter Landrock
      Pages 167-176
    3. George I. Davida, Yvo G. Desmedt
      Pages 183-188
  6. Complexity and Number Theory

About these proceedings

Introduction

The International .4ssociation for Cryptologic Research (1.4CR) organizes tmo - ternational conferences every year, one in Europe and one in the 1-nited States. EUROCRYI’T’88. held in the beautiful environment of the S\~isb mountains in Davos, was the sixth European conference. The number of contributions and of participants at the meeting has increased substantiall!.. which is an indication of the high interest in cryptography and system security in general. The interest has not only increased but has also further moved towards - thentication. signatures and other protocols. This is easy to understand in view of the urgent needs for such protocols, in particular in connection with open - formation systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, 2.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems. was however also well represented and several significant results mere communicated. The present proceedings contain all contributions which were accepted for presentation. The chapters correspond to the sessions at the conference.

Keywords

anonymity authentication complexity cryptoanalysis cryptography cryptology cryptosystem encryption key distribution privacy

Editors and affiliations

  • D. Barstow
  • W. Brauer
  • P. Brinch Hansen
  • D. Gries
  • D. Luckham
  • C. Moler
  • A. Pnueli
  • G. Seegmüller
  • J. Stoer
  • N. Wirth
  • Christoph G. Günther
    • 1
  1. 1.Asea Brown BoveriCorporate ResearchBadenSwitzerland

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-45961-8
  • Copyright Information Springer Verlag Berlin Heidelberg 1988
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-50251-7
  • Online ISBN 978-3-540-45961-3
  • Series Print ISSN 0302-9743
  • About this book