© 1993

Advances in Cryptology — EUROCRYPT’ 92

Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24–28, 1992 Proceedings

  • Rainer A. Rueppel
Conference proceedings EUROCRYPT 1992

Part of the Lecture Notes in Computer Science book series (LNCS, volume 658)

Table of contents

  1. Public Key II

    1. Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
      Pages 221-238
  2. Pseudo-random Permutation Generators

  3. Complexity Theory and Cryptography I

  4. Zero-Knowledge

    1. Kazuo Ohta, Tatsuaki Okamoto, Atsushi Fujioka
      Pages 324-340
    2. Ingrid Biehl, Johannes Buchmann, Bernd Meyer, Christian Thiel, Christoph Thiel
      Pages 356-365
  5. Digital Signatures and Electronic Cash

    1. Eugène van Heyst, Torben Pryds Pedersen
      Pages 366-377
    2. David Chaum, Torben Pryds Pedersen
      Pages 390-407
  6. Complexity Theory and Cryptography II

    1. H. Niederreiter, C. P. Schnorr
      Pages 408-419
    2. Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya
      Pages 420-428
    3. Ueli M. Maurer
      Pages 429-436
  7. Applications

  8. Selected Papers from the Rump Session

About these proceedings


A series of workshops devoted to modern cryptography began in Santa Barbara,California in 1981 and was followed in 1982 by a European counterpart in Burg Feuerstein, Germany. The series has been maintained with summer meetings in Santa Barbara and spring meetings somewhere in Europe. At the 1983 meeting in Santa Barbara the International Association for Cryptologic Research was launched and it now sponsors all the meetings of the series. This volume presents the proceedings of Eurocrypt '92, held in Hungary. The papers are organized into the following parts: Secret sharing, Hash functions, Block ciphers, Stream ciphers, Public key I, Factoring, Trapdoor primes and moduli (panel report), Public key II, Pseudo-random permutation generators, Complexity theory and cryptography I, Zero-knowledge, Digital knowledge and electronic cash, Complexity theory andcryptography II, Applications, and selected papers from the rump session. Following the tradition of the series, the authors produced full papers after the meeting, in some cases with revisions.


Cryptanalysis Komplexitätstheorie Krypto-Analysis Permutation Pseudo-Zufall-Permutationen Public-Key-Cryptosystems Public-Key-Kryptosysteme Z complexity theory cryptoanalysis cryptography cryptology cryptosystems hash function secret sharing

Editors and affiliations

  • Rainer A. Rueppel
    • 1
  1. 1.R3 Security EngineeringWetzikonSwitzerland

Bibliographic information

  • Book Title Advances in Cryptology — EUROCRYPT’ 92
  • Book Subtitle Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24–28, 1992 Proceedings
  • Editors Rainer A. Rueppel
  • Series Title Lecture Notes in Computer Science
  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 1993
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Softcover ISBN 978-3-540-56413-3
  • eBook ISBN 978-3-540-47555-2
  • Series ISSN 0302-9743
  • Edition Number 1
  • Number of Pages X, 491
  • Number of Illustrations 1 b/w illustrations, 0 illustrations in colour
  • Topics Cryptology
    Coding and Information Theory
    Database Management
    Operating Systems
  • Buy this book on publisher's site