Advances in Cryptology — EUROCRYPT ’93

Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23–27, 1993 Proceedings

  • Tor Helleseth
Part of the Lecture Notes in Computer Science book series (LNCS, volume 765)

Table of contents

  1. Front Matter
    Pages I-X
  2. Authentication

    1. Thomas Johansson, Gregory Kabatianskii, Ben Smeets
      Pages 1-11
    2. R. Safavi-Naini, L. Tombak
      Pages 12-27
  3. Public Key

    1. Brandon Dixon, Arjen K. Lenstra
      Pages 28-39
    2. Simon Blackburn, Sean Murphy, Jacques Stern
      Pages 50-54
  4. Block Ciphers

  5. Secret Sharing

    1. Marco Carpentieri, Alfredo De Santis, Ugo Vaccaro
      Pages 118-125
    2. Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii
      Pages 126-141
  6. Stream ciphers

    1. Ernst S. Selmer
      Pages 142-150
    2. Rainer Göttfert, Harald Niederreiter
      Pages 151-158
    3. Joan Daemen, René Govaerts, Joos Vandewalle
      Pages 159-167
    4. Richard A. Games, Joseph J. Rushanan
      Pages 168-180
    5. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
      Pages 181-199
  7. Digital signatures

About these proceedings

Introduction

Eurocrypt is a series of open workshops on the theory and application of cryptographic techniques. These meetings have taken place in Europe every year since 1982 and are sponsored by the International Association for Cryptologic Research. Eurocrypt '93 was held in the village of Lofthus in Norway in May 1993. The call for papers resulted in 117 submissions with authors representing 27 different countries. The 36 accepted papers were selected by the program committee after a blind refereeing process. The papers are grouped into parts on authentication, public key, block ciphers, secret sharing, stream ciphers, digital signatures, protocols, hash functions, payment systems, and cryptanalysis. The volume includes 6 further rump session papers.

Keywords

Datenverschlüsselung Informationstheorie Kodierungstheorie Kryptographische Funktionen Kryptologie authentication coding theory cryptoanalysis cryptographic functions cryptology data encryption encryption hash function information theory sec

Editors and affiliations

  • Tor Helleseth
    • 1
  1. 1.Department of InformaticsUniversity of BergenBergenNorway

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-48285-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 1994
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-57600-6
  • Online ISBN 978-3-540-48285-7
  • Series Print ISSN 0302-9743
  • About this book