Advances in Cryptology, ASIACRYPT '94: 4th International Conference on the Theory and Application of Cryptology, Wollongong, Australia, November 28-December 1, 1994 : Proceedings
Josef Pieprzyk, Reihanah Safavi-Naini
Springer-Verlag, 1995 - Computers - 430 pages
This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994.
Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Multifeature security through homomorphic encryption
Crescenzo Universitd di Salerno Italy
21 other sections not shown
Other editions - View all
A-codes access structure Advances in Cryptology algorithm attack authentication BAN logic bits blind signature block Boolean functions ciphers ciphertext collision complexity Computer Science correlation attack correlation coefficient cosets Crypto cryptographic protocols cryptosystem decryption defined denote differential cryptanalysis digital signature discrete logarithm El-Gamal Eli Biham equation Eurocrypt exponentiation factor feedback hash function IEEE incidence structures input integer key distribution keystream Lecture Notes Lemma linear cryptanalysis linear function log2 lower bound matrix matroid method modes modular multiplications modulo nonlinear Notes in Computer obtain output pair paper participants perfect SS permutation PN sequence polynomial probability problem Proceedings propagation criterion properties prove public key result S-boxes satisfies the propagation secret key secret sharing scheme server shift register solutions Springer-Verlag step string subkeys technique Theorem vectors zero-knowledge proof