Advances in Cryptology — EUROCRYPT’ 92

Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24–28, 1992 Proceedings

  • Rainer A. Rueppel
Conference proceedings EUROCRYPT 1992

DOI: 10.1007/3-540-47555-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 658)

Table of contents

  1. Front Matter
    Pages i-x
  2. Secret Sharing

    1. C. Blundo, A. De Santis, D. R. Stinson, U. Vaccaro
      Pages 1-24
  3. Hash Functions

    1. T. Baritaud, H. Gilbert, M. Girault
      Pages 35-44
    2. Xucjia Lai, James L. Massey
      Pages 55-70
  4. Block Ciphers

  5. Stream Ciphers

  6. Public Key I

    1. Birgit Pfitzmann, Michael Waidner
      Pages 153-162
    2. Greg Harper, Alfred Menezes, Scott Vanstone
      Pages 163-173
  7. Factoring

    1. B. Dixon, A. K. Lenstra
      Pages 183-193
  8. The Eurocrypt’92 Controversial Issue Trapdoor Primes and Moduli

  9. Public Key II

    1. Ernest F. Brickell, Daniel M. Gordon, Kevin S. McCurley, David B. Wilson
      Pages 200-207

About these proceedings

Introduction

A series of workshops devoted to modern cryptography began in Santa Barbara,California in 1981 and was followed in 1982 by a European counterpart in Burg Feuerstein, Germany. The series has been maintained with summer meetings in Santa Barbara and spring meetings somewhere in Europe. At the 1983 meeting in Santa Barbara the International Association for Cryptologic Research was launched and it now sponsors all the meetings of the series. This volume presents the proceedings of Eurocrypt '92, held in Hungary. The papers are organized into the following parts: Secret sharing, Hash functions, Block ciphers, Stream ciphers, Public key I, Factoring, Trapdoor primes and moduli (panel report), Public key II, Pseudo-random permutation generators, Complexity theory and cryptography I, Zero-knowledge, Digital knowledge and electronic cash, Complexity theory andcryptography II, Applications, and selected papers from the rump session. Following the tradition of the series, the authors produced full papers after the meeting, in some cases with revisions.

Keywords

Cryptanalysis Komplexitätstheorie Krypto-Analysis Permutation Pseudo-Zufall-Permutationen Public-Key-Cryptosystems Public-Key-Kryptosysteme Z complexity theory cryptoanalysis cryptography cryptology cryptosystems hash function secret sharing

Editors and affiliations

  • Rainer A. Rueppel
    • 1
  1. 1.R3 Security EngineeringWetzikonSwitzerland

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1993
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-56413-3
  • Online ISBN 978-3-540-47555-2
  • Series Print ISSN 0302-9743