Advances in cryptology, CRYPTO '96: 16th annual international cryptology conference, Santa Barbara, California, USA, August 18-22, 1996 : proceedings, Volume 16
Neal Koblitz, International Association for Cryptologic Research, IEEE Computer Society. Technical Committee on Security and Privacy, University of California, Santa Barbara. Computer Science Dept
Springer, 1996 - Computers - 415 pages
This book constitutes the refereed proceedings of the 16th Annual International Cryptology Conference, CRYPTO '96, held in Santa Barbara, California, USA, in August 1996 under the sponsorship of the International Association for Cryptologic Research (IACR).
The 30 revised full papers presented in the volume were selected from a total of 130 submissions; they are organized in topical sections on hashing and authentication, new systems, cryptoanalysis, hard bits, signatures, zero knowledge, symmetric systems, Diffie-Hellman oracle, quantum cryptography, stream ciphers, and secret sharing. All in all, this book is a current report on the state-of-the-art in the field.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Keying Hash Functions for Message Authentication
Universal Hashing and Multiple Authentication
Universal Hash Functions from Exponential Sums over Finite Fields
28 other sections not shown
Other editions - View all
Advances in Cryptology adversary algebraic algorithm Alice and Bob assume assumption authentication codes BBFP black box field block cipher chosen collision column commitment scheme compression function Computer Science construction correlation-immune cryptanalysis Crypto cryptosystem defined denote differential attack Diffie-Hellman digital signature discrete logarithms efficient element elliptic curve encryption equations exponent exponential factor finite field given half-round Hamming weight hash family hash functions implementation input integer iterated key schedule Lecture Notes Lemma linear complexity matrix meet-in-the-middle attack modulo multiple Notes in Computer obtain oracle output pair parameters partial signatures photons plaintexts polynomial prime private key probability problem Proceedings proof protocol prove public key quantum cryptography queries random related-key secret key Section sequence signature scheme signer Springer-Verlag step string subkeys subset Theorem undeniable signature universal hashing variables verifier weak keys zero-knowledge