Advances in Cryptology — CRYPTO ’96

16th Annual International Cryptology Conference Santa Barbara, California, USA August 18–22, 1996 Proceedings

  • Neal Koblitz
Conference proceedings CRYPTO 1996

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1109)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Hashing and Authentication I

    1. Mihir Bellare, Ran Canetti, Hugo Krawczyk
      Pages 1-15
    2. M. Atici, D. R. Stinson
      Pages 16-30
  3. New Systems

  4. Asymmetric Systems

  5. Hard Bits

  6. Signatures

    1. Rosario Gennaro, Stanisław Jarecki, Hugo Krawczyk, Tal Rabin
      Pages 157-172
    2. Ronald Cramer, Ivan Damgård
      Pages 173-185
  7. Zero Knowledge

  8. Symmetric Systems

    1. Lars R. Knudsen, Willi Meier
      Pages 216-228
    2. Paul C. van Oorschot, Michael J. Wiener
      Pages 229-236
  9. More on Symmetric Systems

    1. John Kelsey, Bruce Schneier, David Wagner
      Pages 237-251
    2. Joe Kilian, Phillip Rogaway
      Pages 252-267
  10. Diffie-Hellman Oracle

    1. Ueli M. Maurer, Stefan Wolf
      Pages 268-282
  11. Hashing and Authentication II

    1. Antoon Bosselaers, René Govaerts, Joos Vandewalle
      Pages 298-312
  12. Quantum Crypto

    1. R. J. Hughes, G. G. Luther, G. L. Morgan, C. G. Peterson, C. Simmons
      Pages 329-342
  13. Stream Ciphers

  14. Secret Sharing

  15. Back Matter
    Pages 417-417

About these proceedings


Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and P- vacy and the Computer Science Department of the University of California at Santa Barbara (UCSB). It takes place at UCSB from August 18 to 22, 1996. The General Chair, Richard Graveman, is responsible for local organization and registration. The scientific program was organized by the 16-member Program C- mittee. We considered 115 papers. (An additional 15 submissions had to be summarily rejected because of lateness or major noncompliance with the c- ditions in the Call for Papers.) Of these, 30 were accepted for presentation. In addition, there will be five invited talks by Ernest Brickell. Andrew Clark, Whitfield Diffie, Ronald Rivest, and Cliff Stoll. A Rump Session will be chaired by Stuart Haber. These proceedings contain the revised versions of the 30 contributed talks. least three com- The submitted version of each paper was examined by at mittee members and/or outside experts, and their comments were taken into account in the revisions. However, the authors (and not the committee) bear full responsibility for the content of their papers.


Datenverschlüsselung Digitale Signaturen Kryptoanalyse Kryptographische Protokolle Quatencryptographi authentication cryptoanalysis cryptographic protocol cryptography cryptology data encryption digital signature digital signatures encryption

Editors and affiliations

  • Neal Koblitz
    • 1
  1. 1.Department of Mathematics SeattleUniversity of WashingtonWashingtonUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 1996
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-61512-5
  • Online ISBN 978-3-540-68697-2
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site