Skip to main content
  • Conference proceedings
  • © 1993

Advances in Cryptology - AUSCRYPT '92

Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 718)

Conference series link(s): AUSCRYPT: International Conference on Cryptology

Conference proceedings info: AUSCRYPT 1992.

Buying options

eBook
USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-47976-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 109.00
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (46 papers)

  1. Front Matter

  2. Threshold cryptosystems

    • Yvo Desmedt
    Pages 1-14
  3. Authentication codes with perfect protection

    • L. Tombak, R. Safavi-Naini
    Pages 15-26
  4. Practical proven secure authentication with arbitration

    • Yvo Desmedt, Jennifer Seberry
    Pages 27-32
  5. Authentication codes under impersonation attack

    • R. Safavi-Naini, L. Tombak
    Pages 33-47
  6. Cumulative arrays and geometric secret sharing schemes

    • Wen-Ai Jackson, Keith M. Martin
    Pages 48-55
  7. Nonperfect secret sharing schemes

    • Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii
    Pages 56-66
  8. A construction of practical secret sharing schemes using linear block codes

    • Michael Bertilsson, Ingemar Ingemarsson
    Pages 67-79
  9. HAVAL — A one-way hashing algorithm with variable length of output (extended abstract)

    • Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry
    Pages 81-104
  10. On the power of memory in the design of collision resistant hash functions

    • Bart Preneel, René Govaerts, Joos Vandewalle
    Pages 105-121
  11. Linear nonequivalence versus nonlinearity

    • Chris Charnes, Josef Pieprzyk
    Pages 156-164
  12. Constructing large cryptographically strong S-boxes

    • John Detombe, Stafford Tavares
    Pages 165-181
  13. Cryptanalysis of LOKI 91

    • Lars Ramkilde Knudsen
    Pages 196-208
  14. Cryptanalysis of summation generator

    • Ed Dawson
    Pages 209-215

Other Volumes

  1. Advances in Cryptology — AUSCRYPT '92

    Workshop on the Theory and Application of Cryptographic Techniques Gold Coast, Queensland, Australia, December 13–16, 1992 Proceedings

About this book

This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.

Keywords

  • Computer Security
  • Computersicherheit
  • Cryptology
  • Data Security
  • Datensicherheit
  • Hashing
  • Public Key Cryptography
  • Public-Key Kryptographie
  • Secure Protocols
  • Sichere Protokolle
  • cryptography
  • combinatorics

Bibliographic Information

Buying options

eBook
USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-47976-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 109.00
Price excludes VAT (USA)