## Advances in Cryptology, CRYPTO '93: 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993 : Proceedings"This volume contains the papers presented at the CRYPTO '93 conference. The conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom) and held in cooperation with the IEEE Computer Society. These proceedings contain revised versions of the 38 contributed talks, as well as two talks from the rump session. The papers are grouped into parts on: cryptosystems, stream ciphers and cryptographic functions, proof systems and zero-knowledge, secret sharing, number theory and algorithms, differential cryptanalysis, complexity theory, applications, authentication codes, hash functions, cryptanalysis, and key distribution."--PUBLISHER'S WEBSITE. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

Efficient signature schemes based on birational permutations | 1 |

The shrinking generator | 22 |

Complexity Theory | 23 |

Copyright | |

23 other sections not shown

### Other editions - View all

### Common terms and phrases

access structures Advances in Cryptology algorithm authentication bent function block cipher Blum integer broadcast message characteristic chosen ciphertext attacks chosen plaintext ciphertext codes collision attack commitment scheme complexity Computer Science construction Crypto cryptographic cryptosystems defined denote differential attack Differential Cryptanalysis digits discrete logarithms distribution efficient encryption equations exists exor factor field sieve Goldwasser hash functions input integer interactive proof system key bits large primes Lecture Notes Lemma length LFSR linear lower bound m-bit modulo non-interactive nonlinearity Notes in Computer one-way functions oracle output participants permutation polynomial probabilistic probability problem protocol prove pseudorandom public key quadratic reduced result right pairs round function S-boxes scheme with broadcast secret key secret sharing scheme sequence Shamir signature scheme Springer-Verlag stream cipher subkey subset Theorem variables vector verifier zero zero-knowledge proof