## Advances in Cryptology - EUROCRYPT '94: Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9 - 12, 1994. ProceedingsThis book constitutes the proceedings of the 1994 Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT '94, held in Perugia, Italy in May 1994. The 36 revised full papers presented in the book are selected from 137 submissions and address all current research and advanced applicational aspects of cryptography; in addition, there are 11 short papers originating from the best special presentations accepted for the traditional rump session. The papers are organized in sections on secret sharing, hash functions, signatures, cryptosystems, pseudorandom generators, authentication codes, key agreement and key distribution, protocols, cryptanalysis and block ciphers, and number theory and algorithms. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

Secret Sharing | 1 |

A linear construction of perfect secret sharing schemes | 23 |

Hash functions | 47 |

Copyright | |

5 other sections not shown

### Other editions - View all

### Common terms and phrases

A-code access structure Advances in Cryptology algorithm Alice attack authentication binary blind signature block cipher boxes broadcast encryption broadcast encryption scheme Chaum checking center ciphertext codes coin common key Computer Science construction corresponding Crypto cryptographic cryptosystem defined denote differential cryptanalysis Digital Signature discrete logarithm equation EUROCRYPT given group signature hash function honest IEEE input integer iterative key distribution knapsack problem Lecture Notes Lemma length LFSR linear cryptanalysis lower bound matrix message recovery mod q modp modulo multiplications node nonlinearity Notes in Computer obtain output pair parameters participants permutation plaintext polynomial possible probability Proceedings proof of knowledge protocol prove public key random variable requirements residue knapsack result round S-boxes satisfies secret key secret sharing scheme Section sends sequence Shamir shift register signature scheme signer Springer-Verlag string subset Theorem trapdoor undeniable signature upper bound vector verifier zero-knowledge proof zero-message