Advances in Cryptology - ASIACRYPT '91: International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991. Proceedings
Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto
Springer, Nov 19, 1993 - Computers - 499 pages
This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DES-like cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers - foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers - foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Cryptanalysis of LOKI
A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis
35 other sections not shown
Advances in Cryptology assume assumption attack block cipher chosen ciphertext claw free computationally Computer Science construct Crypto Cryptology cryptosystem decrypt defined Definition denote differential cryptanalysis discrete logarithm distinguishing circuit distribution EDLP elliptic curve equations exists GF(q Goldreich group administrator hash function identity IEEE input integer interactive proof system iteration language Lemma LOKI machine Micali modulo multisignature node oblivious transfer one-way function oracle gates output overwhelming probability pairs paper participant perfect ZKIP plaintext possession of knowledge prime factor probabilistic encryption probabilistic polynomial probably prime problem Proc Proceedings proposed prove pseudorandom permutation public key queries random functions random variables randomly result rounds S-boxes satisfy scrambler secret key secret sharing secret witness sequence Shamir signature scheme step super pseudorandom Theorem transformation vector verifier zero-knowledge interactive proof zero-knowledge proof ZKIP of possession