×
Loading...

Advances in cryptology--EUROCRYPT '97 : International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997 : proceedings by EUROCRYPT '97 (1997 : Konstanz, Germany)

Book Information

TitleAdvances in cryptology--EUROCRYPT '97 : International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997 : proceedings
CreatorEUROCRYPT '97 (1997 : Konstanz, Germany), Fumy, Walter, International Association for Cryptologic Research
Year1997
PPI300
PublisherBerlin ; New York : Springer
LanguageEnglish
Mediatypetexts
SubjectComputers, Cryptography, protocole, clé accès, authentification, sécurité informatique, signature numérique, cryptographie, Cryptographie, Ordinateurs, Geheimschrift, Computabilidade e modelos de computacao, Geheimschrift, Computabilidade e modelos de computacao, Ordinateurs, Cryptographie
ISBN3540629750, 9783540629757
Collectionjournals_contributions, journals
Uploadersketch
Identifierspringer_10.1007-3-540-69053-0
Telegram icon Share on Telegram
Download Now

Description

Advances in Cryptology — EUROCRYPT ’97: International Conference on the Theory and Application of Cryptographic Techniques Konstanz, Germany, May 11–15, 1997 ProceedingsAuthor: Walter Fumy Published by Springer Berlin Heidelberg ISBN: 978-3-540-62975-7 DOI: 10.1007/3-540-69053-0Table of Contents:Two Attacks on Reduced IDEA Combinatorial Properties of Basic Encryption Operations A New Public-Key Cryptosystem On the Importance of Checking Cryptographic Protocols for Faults Lattice Attacks on NTRU Kleptography: Using Cryptography Against Cryptography Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation Anonymous Fingerprinting A Secure and Optimally Efficient Multi-Authority Election Scheme Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals The GCHQ Protocol and Its Problems Bucket Hashing with a Small Key Size A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost Smooth Entropy and Rényi Entropy Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion Linear Statistical Weakness of Alleged RC4 Keystream Generator Cryptanalysis of Alleged A5 Stream Cipher Lower Bounds for Discrete Logarithms and Related Problems Stronger Security Proofs for RSA and Rabin Bits Round-Optimal Zero-Knowledge Arguments Based on Any One-Way Function, "Sponsored by the International Association for Cryptologic Research (IACR)"--Page [vii], Includes bibliographical references and index, Two Attacks on Reduced IDEA / Johan Borst, Lars R. Knudsen and Vincent Rijmen -- Combinatorial Properties of Basic Encryption Operations / Thilo Zieschang -- A New Public-Key Cryptosystem / David Naccache and Jacques Stern -- On the Importance of Checking Cryptographic Protocols for Faults / Dan Boneh, Richard A. DeMillo and Richard J. Lipton -- Lattice Attacks on NTRU / Don Coppersmith and Adi Shamir -- Kleptography: Using Cryptography Against Cryptography / Adam Young and Moti Yung -- Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation / Ronald Cramer and Ivan Damgard -- Anonymous Fingerprinting / Birgit Pfitzmann and Michael Waidner -- A Secure and Optimally Efficient Multi-Authority Election Scheme / Ronald Cramer, Rosario Gennaro and Berry Schoenmakers -- Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals / Eric R. Verheul and Henk C.A. van Tilborg -- The GCHQ Protocol and Its Problems / Ross Anderson and Michael Roe, Sponsored by the International Association for Cryptologic Research