Table of contents

  1. Front Matter
  2. Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester
    Pages 19-32
  3. Wen -Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Pages 42-54
  4. Kaoru Kurosawa, Koji Okada
    Pages 55-64
  5. Amparo Fúster-Sabater, Pino Caballero-Gil
    Pages 80-90
  6. Seongtaek Chee, Sangjin Lee, Kwangjo Kim
    Pages 105-118
  7. Jennifer Seberry, Xian -Mo Zhang, Yuliang Zheng
    Pages 119-132
  8. Catherine A. Meadows, Catherine A. Meadows
    Pages 133-150
  9. Yacov Yacobi
    Pages 151-163
  10. Valtteri Niemi, Ari Renvall
    Pages 164-170
  11. Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano
    Pages 182-192
  12. R. Safavi-Naini, L. Tombak
    Pages 209-223
  13. Mohssen Alabbadi, Stephen B. Wicker
    Pages 238-248

About these proceedings


This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994.
Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms.


authentication cryptoanalysis cryptography cryptology digital signature hash function secret sharing

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 1995
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-59339-3
  • Online ISBN 978-3-540-49236-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book