## Advances in Cryptology--ASIACRYPT'98: International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18-22, 1998 : ProceedingsThis book constitutes the refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT'98, held in Beijing, China, in October 1998. The 32 revised full papers presented were carefully reviewed and selected from a total of 118 submissions. The book is divided in topical sections on public-key cryptosystems, elliptic-curve cryptosystems, cryptanalysis, digital signature schemes, finite automata, authentication codes, electronic cash, stream ciphers, cryptographic protocols, key escrow, new cryptography, and information theory. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

Public Key Cryptosystems | 1 |

An Attack on RSA Given a Small Fraction of the Private Key Bits | 25 |

Invited Talk | 50 |

Copyright | |

29 other sections not shown

### Common terms and phrases

Advances in Cryptology adversary algorithm Alice and Bob assume assumption attack authentication binary buyer calculate choose cipher ciphertext Colin complexity Computer Science confirmable signature construction cryptanalysis Crypto cryptography decoding decryption defined denote Diffie-Hellman digital signatures discrete logarithm distribution efficient ElGamal ElGamal encryption elliptic curve encryption equation EUROCRYPT factor finite fields given IEEE implementation input integer inverse Jacobian Jacobian coordinates KCDSA known Lecture Notes Lemma LFSRs linear LNCS McEliece method ML-sequences modulo MRA-code n-bit Notes in Computer Oblivious Transfer obtain output pair parameters plaintext polynomial prime primitive polynomial probability Proceedings proposed prove public key public-key cryptosystem quadratic randomly reduced round SAFER RSA moduli S-boxes secret key sequence signature scheme simulator Springer-Verlag step stream cipher Theorem trapdoor truncated differential undeniable signatures variants vector verifiable zero-knowledge proof