Advances in Cryptology — EUROCRYPT ’91

Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings

  • Donald W. Davies
Part of the Lecture Notes in Computer Science book series (LNCS, volume 547)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Cryptanalysis I

    1. Eli Biham, Adi Shamir
      Pages 1-16
    2. Xuejia Lai, James L. Massey, Sean Murphy
      Pages 17-38
    3. Paul Camion, Jacques Patarin
      Pages 39-53
  3. Cryptanalysis II

    1. M. J. Coster, B. A. LaMacchia, A. M. Odlyzko, C. P. Schnorr
      Pages 54-67
    2. Valery I. Korzhik, Andrey I. Turkin
      Pages 68-70
  4. Zero Knowledge and Oblivious Transfer

    1. Mike Burmester, Yvo Desmedt
      Pages 81-95
    2. Tatsuaki Okamoto, David Chaum, Kazuo Ohta
      Pages 96-105
    3. Claude Crépeau, Miklós Sántha
      Pages 106-113
  5. Sequences I

    1. Toshiki Habutsu, Yoshifumi Nishio, Iwao Sasase, Shinsaku Mori
      Pages 127-140
    2. B. Preneel, René Govaerts, Joos Vandewalle
      Pages 141-152
  6. Sequences II

  7. Sequences III

  8. Signatures

    1. Yvo Desmedt, Moti Yung
      Pages 205-220

About these proceedings

Introduction

A series of open workshops devoted to modem cryptology began in Santa Barbara, California in 1981 and was followed in 1982 by a European counterpart in Burg Feurstein, Germany. The series has been maintained with summer meetings in Santa Barbara and spring meetings somewhere in Europe. At the 1983 meeting in Santa Barbara the International Association for Cryptologic Research was launched and it now sponsors all the meetings of the series. Following the tradition of the series, papers were invited in the form of extended abstracts and were reviewed by the programme committee, which selected those to be presented. After the meeting, full papers were produced, in some cases with impro- ments and corrections. These papers form the main part of the present volume. They are placed in the same order that they took at the meeting and under the same headings, for ease of reference by those who attended. The classification under these headings was a little arbitary, needing to fit the timing of the day‘s activities, but it makes a workable method of arrangement. Also following tradition, a “rump session’’ was held during one evening, under the effective chairmanship of John Gordon. These were short presentations and those present found them to have some real interest, therefore we have taken the unusual step of including short papers contributed by the rump session speakers at the end of this volume, with a necessarily simplified review process.

Keywords

Cryptanalysis Krypto-Analysis Public-Key Kryptosysteme Public-Key-Cryptosystems Sequences Signaturen Signatures Zero-Knowledge Zero-Knowlwdge Zufallsfolgen cryptoanalysis cryptography cryptology cryptosystems

Editors and affiliations

  • Donald W. Davies
    • 1
  1. 1.Royal Holloway and Bedford New CollegeUniv. of LondonSurreyUK

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-46416-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 1991
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-54620-7
  • Online ISBN 978-3-540-46416-7
  • Series Print ISSN 0302-9743