Advances in cryptology, CRYPTO '95: 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995 : proceedings, Volume 12
International Association for Cryptologic Research, IEEE Computer Society. Technical Committee on Security and Privacy
Springer, 1995 - Computers - 465 pages
This book presents the proceedings of the 15th Annual International Cryptology Conference, CRYPTO '95, held in Santa Barbara, California in August 1995.
This proceedings contain revised full versions of 36 papers selected during a highly competitive refereeing process from a total of 151 submissions. All current topics in cryptology research and advanced applications are addressed; The papers are organized in sections on MAC and hash, number theory, oblivious transfer, cryptanalysis, key escrow, protocols, zero knowledge and interactive protocols, secret sharing, and everything else.
What people are saying - Write a review
We haven't found any reviews in the usual places.
MAC and Hash
New Methods for Message Authentication Using
Bucket Hashing and its Application to Fast Message Authentication
15 other sections not shown
Other editions - View all
Advances in Cryptology — CRYPTO ’95: 15th Annual International Cryptology ...
No preview available - 1995
active attacks Advances in Cryptology adversary algorithm Alice Alice and Bob assume assumption authentication BCXs Bit Commitment block cipher byte choose chosen chosen ciphertext attacks ciphertext client codeword collision commitment scheme complexity Computer Science construction Cryptanalysis Crypto cryptographic cryptosystems decryption denote digital signature discrete logarithm distribution efficient elliptic curve encryption equations Eurocrypt exponentiation factor GBCX given hash function honest IEEE implementation input integer key escrow large primes Lemma linear approximations linear cryptanalysis LNCS method Micali mod q modular multiplications modulo Notes in Computer Oblivious Transfer obtain output pairs participants parties permutations plaintexts polynomial precomputed probability problem Proc Proceedings properties protocol prove pseudorandom public key reconstruction result round RSA-S1M S-box secret key secret sharing scheme secret vectors sends server server-aided signature scheme simulator Springer-Verlag step string Theorem trustees verifier zero-knowledge proofs