Advances in cryptology, ASIACRYPT '91: International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991 : proceedings
This volume contains the proceedings of ASIACRYPT '91, thefirst international conference on the theory and applicationof cryptology to be held in the Asian area. It was held atFujiyoshida, near Mount Fuji in Japan, in November 1991.The conference was modeled after the very successful CRYTOand EUROCRYPT series of conferences sponsored by theInternational Association for Cryptologic Research (IACR).The IACR and the Institute of Electronics, Information andCommunication Engineers were sponsors for ASIACRYPT '91.The papers from the conference were improved and correctedfor inclusion in this volume. The papers are grouped intoparts on: differential cryptanalysis and DES-likecryptosystems; hashing and signature schemes; secretsharing, threshold, and authenticationcodes; block ciphers- foundations and analysis; cryptanalysis and new ciphers;proof systems and interactive protocols; public key ciphers- foundations and analysis. Also included are four invitedlectures and impromptu talks from the rump session.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Differential Cryptanalysis and DESLike Cryptosystems
A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis
35 other sections not shown
Advances in Cryptology assume assumption attack block cipher chosen ciphertext claw free computationally Computer Science construct Crypto Cryptology cryptosystem decrypt defined Definition denote differential cryptanalysis discrete logarithm distribution EDLP elliptic curve equations exists GF(q Goldreich group administrator hash function identity IEEE input integer interactive proof system iteration language Lemma LOKI Micali modulo multisignature node oblivious transfer one-way function oracle gates output overwhelming probability pairs paper participant perfect ZKIP plaintext possession of knowledge prime factor probabilistic encryption probabilistic polynomial probably prime problem Proc proposed protocol prove pseudorandom permutation public key queries random functions random self-reducible random variables randomly result rounds S-boxes satisfy scrambler secret key secret sharing secret witness sequence Shamir signature scheme step super pseudorandom Theorem transformation vector verifier zero-knowledge interactive proof zero-knowledge proof ZKIP of possession