© 1996

Advances in Cryptology — EUROCRYPT ’96

International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12–16, 1996 Proceedings

  • Ueli Maurer
Conference proceedings EUROCRYPT 1996

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1070)

Table of contents

  1. Cryptanalysis II

    1. Lars R. Knudsen, M. J. B. Robshaw
      Pages 224-236
    2. Lars R. Knudsen, Torben P. Pedersen
      Pages 237-244
  2. Pseudorandomness

    1. Jean-Bernard Fischer, Jacques Stern
      Pages 245-255
    2. Andrew Klapper
      Pages 256-267
  3. Cryptographic Functions

    1. Paul Camion, Anne Canteaut
      Pages 283-293
    2. William Aiello, Ramarathnam Venkatesan
      Pages 307-320
  4. Key Management and Identification Schemes

    1. Victor Shoup, Avi Rubin
      Pages 321-331
    2. Paul C. van Oorschot, Michael J. Wiener
      Pages 332-343
  5. Digital Signature Schemes

    1. Rosario Gennaro, Stanisław Jarecki, Hugo Krawczyk, Tal Rabin
      Pages 354-371
    2. Ivan Damgård, Torben Pedersen
      Pages 372-386
    3. David Pointcheval, Jacques Stern
      Pages 387-398
  6. Back Matter
    Pages 417-417

About these proceedings


The EUROCRYPT ’96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa. It took place at the Palacio de Congresos in Saragossa, Spain, during May 12-16, 1996. This was the fifteenth annual EUROCRYPT conference (this name has been used since the third conference held in 1984), each of which has been held in a different city in Europe. For the second time, proceedings were available at the conference. JosC Pastor Franco, the General Chair, was resp- sible for local organization and registration. His contribution to the snccess of the conference is gratefully acknowledged. The Program Committee considered 126 submitted papers and selected 34 for presentation. Each paper was sent to all members of the Program Committee and was assigned to at least three of them for careful evaluation. There were also two invited talks. James L. Massey, this year’s IACR Distinguished Ltcturer, gave a lecture entitled “The difficulty with difficulty”. Massey is the third to receive this honor, the first two being Gustavus Simmons and Adi Shamir. Shafi Goldwasser gave an invited talk entitled “Multi party secure protocols: past and present”. These proceedings contain revised versions of the 34 contributed talks. While the papers were carefully selected, they have not been refereed like submissions to a refereed journal. The authors bear full responsibility for the contents of their papers. Some authors may write final versions of their papers for publication in a refereed journal.


Cryptanalysis Cryptographic Functions Kommunikationsprotokoll Kryptoanalyse Public Key Cryptosystems Public-Key-Kryptosysteme Telecomm algorithms communication protocols cryptoanalysis cryptology cryptosystems digital signature secret sharing

Editors and affiliations

  • Ueli Maurer
    • 1
  1. 1.Department of Computer ScienceSwiss Federal Institute of Technology (ETH)ZürichSwitzerland

Bibliographic information