Advances in Cryptology — CRYPTO’ 93

13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings

  • Douglas R. Stinson
Conference proceedings CRYPTO 1993

Part of the Lecture Notes in Computer Science book series (LNCS, volume 773)

Table of contents

  1. Front Matter
    Pages I-X
  2. Cryptosystems

    1. Don Coppersmith, Hugo Krawczyk, Yishay Mansour
      Pages 22-39
  3. Stream Ciphers and Cryptographic Functions

  4. Proof Systems and Zero-knowledge

  5. Secret Sharing

    1. C. Blundo, A. Cresti, A. De Santis, U. Vaccaro
      Pages 110-125
    2. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe
      Pages 126-135
    3. Hugo Krawczyk
      Pages 136-146
  6. Number Theory and Algorithms

    1. Leonard M. Adleman, Jonathan DeMarrais
      Pages 147-158
    2. J. Buchmann, J. Loho, J. Zayer
      Pages 159-165
    3. T. Denny, B. Dodson, A. K. Lenstra, M. S. Manasse
      Pages 166-174
    4. Antoon Bosselaers, René Govaerts, Joos Vandewalle
      Pages 175-186
  7. Differential Cryptanalysis

    1. Ishai Ben-Aroya, Eli Biham
      Pages 187-199
    2. Kazuo Ohta, Mitsuru Matsui
      Pages 200-211
    3. Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens
      Pages 212-223
    4. Joan Daemen, René Govaerts, Joos Vandewalle
      Pages 224-231
  8. Complexity Theory

    1. Mihir Bellare, Phillip Rogaway
      Pages 232-249
    2. Ivan B. Damgård, Torben P. Pedersen, Birgit Pfitzmann
      Pages 250-265
    3. Matthew Franklin, Stuart Haber
      Pages 266-277
    4. Avrim Blum, Merrick Furst, Michael Kearns, Richard J. Lipton
      Pages 278-291
  9. Applications

    1. Niels Ferguson
      Pages 292-301
    2. Claude Crépeau, Joe Kilian
      Pages 319-330
  10. Authentication Codes

    1. Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben Smeets
      Pages 331-342
    2. Pete Gemmell, Moni Naor
      Pages 355-367
  11. Hash Functions

    1. Bart Preneel, René Govaerts, Joos Vandewalle
      Pages 368-378
    2. Walter Hohl, Xuejia Lai, Thomas Meier, Christian Waldvogel
      Pages 379-390
  12. Cryptanalysis

    1. Jaques Patarin, Pascal Chauvaud
      Pages 391-402
    2. Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
      Pages 413-419
    3. Don Coppersmith, Jacques Stern, Serge Vaudenay
      Pages 435-443
  13. Key Distribution

    1. Amos Beimel, Benny Chor
      Pages 444-455
    2. Tom Leighton, Silvio Micali
      Pages 456-479
    3. Amos Fiat, Moni Naor
      Pages 480-491
  14. Back Matter
    Pages 492-492

About these proceedings


The CRYPTO ’93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee. It took place at the University of California, Santa Barbara, from August 22-26, 1993. This was the thirteenth annual CRYPTO conference, all of which have been held at UCSB. The conference was very enjoyable and ran very of the General Chair, Paul Van Oorschot. smoothly, largely due to the efforts It was a pleasure working with Paul throughout the months leading up to the conference. There were 136 submitted papers which were considered by the Program Committee. Of these, 38 were selected for presentation at the conference. There was also one invited talk at the conference, presented by Miles Smid, the title of which was “A Status Report On the Federal Government Key Escrow System.” The conference also included the customary Rump Session, which was presided over by Whit Diffie in his usual inimitable fashion. Thanks again to Whit for organizing and running the Rump session. This year, the Rump Session included an interesting and lively panel discussion on issues pertaining to key escrowing. Those taking part were W. Diffie, J. Gilmore, S. Goldwasser, M. Hellman, A. Herzberg, S. Micali, R. Rueppel, G. Simmons and D. Weitzner.


Datenverschlüsselung Hash-Funktionen Kodierungstheorie Kryptologie authentication coding theory complexity theory cryptanalysis cryptoanalysis cryptology cryptosystems encryption hash function hash functions secret sharing

Editors and affiliations

  • Douglas R. Stinson
    • 1
  1. 1.Computer Science and Engineering Department and Center for Communication and Information ScienceUniversity of NebraskaLincolnUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 1994
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-57766-9
  • Online ISBN 978-3-540-48329-8
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site