## Advances in Cryptology - CRYPTO '90: ProceedingsThis volume gives the proceedings of Crypto '90, held at the University of California at Santa Barbara, August 11-15, 1990. The conference attracted 227 participants from twenty countries, with attendees from academia, industry, and government. The program provided a balance between the theoretical and the practical aspects of cryptography to meet the needs and diversified interests of the various groups. The selected papers are organized into sections on cryptanalysis, protocols, algebra and number theory, signatures and authentication, secret sharing, key distribution,hash functions, zero-knowledge, randomness, applications, design and analysis, and impromptu talks. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

Differential Cryptanalysis of DESlike Cryptosystems invited talk | 2 |

A Statistical Attack of the Feal8 Cryptosystem | 22 |

Quantum Bit Commitment and Coin Tossing Protocols | 49 |

Copyright | |

36 other sections not shown

### Other editions - View all

### Common terms and phrases

algorithm assumption attack authentication bit commitment scheme block byte chosen chosen plaintext attack ciphertext circuit coin flips commitment scheme Computer Science concurrence scheme constant construct CRYPTO cryptographic cryptosystem define Definition denote digital signature digital signature scheme discrete logarithm elliptic curve entries equations exists exponentiation Fiat-Shamir given Goldreich Goldwasser group action identity-based IEEE implementation input bits integer interactive proof systems key distribution schemes Khufu Lemma matrix Micali modulo non-interactive non-transitive digital signature notarized envelope oblivious transfer one-way function one-way hash functions output bits pairs participants permutation plaintext players polynomial-time probabilistic polynomial probability problem Proc protocol prove pseudo-random public key random bits random number random string randomly result round S-box secret key secret sharing secure sends sequence Shamir shared secret scheme signer simulator statistical Step strong S-boxes Theorem time-stamping undeniable signature uniformly verifier zero-knowledge proof