Advertisement

Table of contents

  1. Front Matter
  2. Moni Naor, Adi Shamir
    Pages 1-12
  3. László Csirmaz
    Pages 13-22
  4. C. Blundo, A. Giorgio Gaggia, D. R. Stinson
    Pages 35-46
  5. Antoine Joux, Louis Granboulan
    Pages 58-66
  6. Matthew Franklin, Moti Yung
    Pages 67-76
  7. David Naccache, David M'RaÏhi, Serge Vaudenay, Dan Raphaeli
    Pages 77-85
  8. David Chaum
    Pages 86-91
  9. Mihir Bellare, Phillip Rogaway
    Pages 92-111
  10. L. Chen, I. B. Damgård, T. P. Pedersen
    Pages 140-155
  11. Stefano D'Amiano, Giovanni Di Crescenzo
    Pages 156-170
  12. L. Chen, T. P. Pedersen
    Pages 171-181
  13. Willi Meier, Othmar Staffelbach
    Pages 205-214
  14. R. Safavi-Naini, L. Tombak
    Pages 254-265
  15. Christian Cachin, Ueli M. Maurer
    Pages 266-274
  16. Mike Burmester, Yvo Desmedt
    Pages 275-286
  17. Carlo Blundo, Antonella Cresti
    Pages 287-298
  18. Tony Eng, Tatsuaki Okamoto
    Pages 306-319
  19. Paul Syverson, Catherine Meadows
    Pages 320-331
  20. Birgit Pfitzmann
    Pages 332-340
  21. Eli Biham
    Pages 341-355
  22. Florent Chabaud, Serge Vaudenay
    Pages 356-365
  23. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Pages 376-388
  24. F. Damm, F. -P. Heider, G. Wambach
    Pages 400-409
  25. Lars Ramkilde Knudsen
    Pages 419-424
  26. Markus Jakobsson
    Pages 425-427
  27. Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler
    Pages 428-432
  28. C. Charnes, L. O'Connor, J. Pieprzyk, R. Safavi-Naini, Y. Zheng
    Pages 433-438
  29. Kaisa Nyberg
    Pages 439-444
  30. Renato Menicocci
    Pages 450-455
  31. Thomas Johansson, Ben Smeets
    Pages 456-460
  32. Eli Biham, Alex Biryukov
    Pages 461-467
  33. J. Hruby
    Pages 468-472

About these proceedings

Introduction

This book constitutes the proceedings of the 1994 Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT '94, held in Perugia, Italy in May 1994.
The 36 revised full papers presented in the book are selected from 137 submissions and address all current research and advanced applicational aspects of cryptography; in addition, there are 11 short papers originating from the best special presentations accepted for the traditional rump session. The papers are organized in sections on secret sharing, hash functions, signatures, cryptosystems, pseudorandom generators, authentication codes, key agreement and key distribution, protocols, cryptanalysis and block ciphers, and number theory and algorithms.

Keywords

Communication Protocols Cryptoanalysis Cryptosystems Data Security Datensicherheit Kommunikationsprotokolle Kryptoanalysis Kryptosysteme Systems Security Systemsicherheit algorithms cryptography

Bibliographic information

  • DOI https://doi.org/10.1007/BFb0053418
  • Copyright Information Springer-Verlag Berlin Heidelberg 1995
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-60176-0
  • Online ISBN 978-3-540-44717-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site