Advertisement

Table of contents

  1. Front Matter
  2. Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester
    Pages 19-32
  3. Wen -Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Pages 42-54
  4. Kaoru Kurosawa, Koji Okada
    Pages 55-64
  5. Amparo Fúster-Sabater, Pino Caballero-Gil
    Pages 80-90
  6. Seongtaek Chee, Sangjin Lee, Kwangjo Kim
    Pages 105-118
  7. Jennifer Seberry, Xian -Mo Zhang, Yuliang Zheng
    Pages 119-132
  8. Catherine A. Meadows, Catherine A. Meadows
    Pages 133-150
  9. Yacov Yacobi
    Pages 151-163
  10. Valtteri Niemi, Ari Renvall
    Pages 164-170
  11. Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano
    Pages 182-192
  12. R. Safavi-Naini, L. Tombak
    Pages 209-223
  13. Mohssen Alabbadi, Stephen B. Wicker
    Pages 238-248
  14. Philippe Béguin, Jean -Jacques Quisquater
    Pages 249-259
  15. Derek Atkins, Michael Graff, Arjen K. Lenstra, Paul C. Leyland
    Pages 261-277
  16. Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui
    Pages 293-303
  17. Chris Charnes, Josef Pieprzyk
    Pages 322-330
  18. Kaoru Kurosawa, Koji Okada, Keiichi Sakano
    Pages 331-341
  19. Tsutomu Matsumoto
    Pages 342-353
  20. Kaoru Kurosawa, Koji Okada, Shigeo Tsujii
    Pages 376-383
  21. Luke O'Connor, Jovan Dj. Golić
    Pages 385-397
  22. Eli Biham, Alex Biryukov
    Pages 398-412
  23. Xingong Chang, Zong -Duo Dai, Guang Gong
    Pages 413-418
  24. Donald Beaver
    Pages 419-423
  25. G. Carter, A. Clark, L. Nielsen
    Pages 427-430
  26. Back Matter

About these proceedings

Introduction

This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994.
Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms.

Keywords

authentication cryptoanalysis cryptography cryptology digital signature hash function secret sharing

Bibliographic information

  • DOI https://doi.org/10.1007/BFb0000419
  • Copyright Information Springer-Verlag Berlin Heidelberg 1995
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-59339-3
  • Online ISBN 978-3-540-49236-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site