## Advances in Cryptology - CRYPTO '90: ProceedingsThis volume gives the proceedings of Crypto '90, held at the University of California at Santa Barbara, August 11-15, 1990. The conference attracted 227 participants from twenty countries, with attendees from academia, industry, and government. The program provided a balance between the theoretical and the practical aspects of cryptography to meet the needs and diversified interests of the various groups. The selected papers are organized into sections on cryptanalysis, protocols, algebra and number theory, signatures and authentication, secret sharing, key distribution,hash functions, zero-knowledge, randomness, applications, design and analysis, and impromptu talks. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

Differential Cryptanalysis of DESlike Cryptosystems invited talk | 2 |

A Statistical Attack of the Feal8 Cryptosystem | 22 |

Quantum Bit Commitment and Coin Tossing Protocols | 49 |

Copyright | |

5 other sections not shown

### Other editions - View all

### Common terms and phrases

Advances in Cryptology algorithm assumption attack authentication bit commitment scheme block bytes chosen plaintext attack cipher ciphertext circuit coin flips commitment scheme complexity Computer Science concurrence scheme construct CRYPTO cryptographic Cryptology cryptosystem defined Definition denote digital signature digital signature scheme discrete logarithm elliptic curve encryption entries equations exists exponentiation factor Gaussian elimination given Goldwasser group action IEEE implementation input bits instance-hiding integer interactive proof systems key distribution Khufu Lemma linear matrix Micali modulo NIZK non-interactive notarized envelope oblivious transfer one-way function one-way hash functions output bits pairs participants permutation players polynomial polynomial-time prime probabilistic probability problem Proc protocol prove pseudo-random public key random bits randomly result round S-box secret key secret sharing secure sends sequence Shamir signer simulator statistical Step Theorem time-stamping undeniable signature uniformly verifier zero-knowledge proof