Advances in Cryptology - CRYPTO '97: 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, Volume 17 (Google eBook)

Front Cover
Burton S.Jr. Kaliski
Springer Science & Business Media, Aug 6, 1997 - Business & Economics - 537 pages
0 Reviews
This book constitutes the refereed proceedings of the 17th Annual International Cryptology Conference, CRYPTO'97, held in Santa Barbara, California, USA, in August 1997 under the sponsorship of the International Association for Cryptologic Research (IACR).
The volume presents 35 revised full papers selected from 160 submissions received. Also included are two invited presentations. The papers are organized in sections on complexity theory, cryptographic primitives, lattice-based cryptography, digital signatures, cryptanalysis of public-key cryptosystems, information theory, elliptic curve implementation, number-theoretic systems, distributed cryptography, hash functions, cryptanalysis of secret-key cryptosystems.
  

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

The Complexity of Computing Hard Core Predicates
1
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
16
Keeping the SZKVerifier Honest Unconditionally
31
On the Foundations of Modern Cryptography
46
Plug and Play Encryption
75
Deniable Encryption
90
Eliminating Decryption Errors in the AjtaiDwork Cryptosystem
105
PublicKey Cryptosystems from Lattice Reduction Problems
112
Privacy Amplification Secure Against Active Adversaries
307
Visual Authentication and Identification
322
The Good the Bad and the Ugly
337
Efficient Algorithms for Elliptic Curve Cryptosystems
342
An Improved Algorithm for Arithmetic on a Family of Elliptic Curves
357
Fast RSAType Cryptosystems Using NAdic Expansion
372
A One Way Function Based on Ideal Arithmetic in Number Fields
385
Efficient Anonymous Multicast and Reception
395

RSABased Undeniable Signatures
132
Security of Blind Digital Signatures
150
Digital Signcryption or How to Achieve CostSignature Encryption CostSignature + CostEncryption
165
How to Sign Digital Streams
180
A Cryptanalysis of the QuVanstone Cryptosystem Based on Group Factorizations
198
Failure of the McEIiece PublicKey Cryptosystem Under MessageResend and RelatedMessage Attack
213
A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy
221
On the Security of the KMOV Public Key Cryptosystem
235
A Key Recovery Attack on Discrete Logbased Schemes Using a Prime Order Subgroup
249
The Prevalence of Kleptographic Attacks on DiscreteLog Based Cryptosystems
264
The DBS Case
277
Unconditional Security Against MemoryBounded Adversaries
292
Efficient Group Signature Schemes for Large Groups
410
Efficient Generation of Shared RSA Keys
425
Proactive RSA
440
Hash Functions That Hide All Partial Information
455
Towards Making UOWHFs Practical
470
Fast and Secure Hashing Based on Codes
485
Edit Distance Correlation Attack on the Alternating Step Generator
499
Differential Fault Analysis of Secret Key Cryptosystems
513
Algorithm
526
Author Index
539
Erratum
540
Copyright

Common terms and phrases

Bibliographic information