Advances in Cryptology - EUROCRYPT '98: International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceedings
Springer, Jun 19, 1998 - Computers - 607 pages
This book constitutes the refereed proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '98, held in Espoo, Finland, in May/June 1998. The book presents 44 revised full papers selected from a total of 161 submissions. The papers are organized in sections on distributed cryptography, complexity, cryptanalysis of block ciphers, computational algorithms, paradigms for symmetric systems, public key cryptosystems, multi-party computation, digital signatures, Boolean functions, combinatorial design and analysis, elliptic curve systems, and electronic commerce and payment.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Autorecoverable autocertifiable cryptosystems
A practical and provably secure scheme for publicly verifiable secret
Reductions and Lower Bounds
33 other sections not shown
Other editions - View all
access structure Advances in Cryptology adversary algorithm assume assumption attack authentication bits blind signature block cipher Boolean functions chooses chosen ciphertext clients commitment scheme complexity Computer Science construction Crypto cryptographic Cryptology cryptosystem decryption defined denote Diffie-Hellman discrete logarithm distribution efficient ElGamal elliptic curve equations escrow Eurocrypt exists exponentiation factoring given hash function input integer interactive key escrow Lecture Notes Lemma linear LNCS lower bound mod q modulo multicast multicast lines multiple nonlinearity Notes in Computer oblivious transfer obtain one-way output pair parameters plaintext players polynomial prime probabilistic problem Proc proof prove public key queries quorum systems random oracle random oracle model randomly reduction result satisfies secret key secret sharing scheme Section server signature scheme simulator Springer Springer-Verlag subset t-linear permutations Theorem undeniable signature variables verifier weak key zero-knowledge zero-knowledge proof