## Advances in cryptology, EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996 : proceedingsThis book constitutes the refereed proceedings of EUROCRYPT '96, the 1996 International Conference on the Theory and Application of Cryptographic Techniques, held in Saragossa, Spain, in May 1996, under the sponsorship of the International Association for Cryptologic Research (IACR). The book contains revised versions of the 34 papers selected from a total of 126 submissions. All current aspects of the booming area of cryptologic research and advanced applications are addressed. There are sections on cryptanalysis, public key cryptosystems, new schemes and protocols, multi-party computation, proofs of knowledge, number theory and algorithms, secret sharing, pseudorandomness, cryptographic functions, key management and identification schemes, and digital signature schemes. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

On the security of two MAC algorithms | 19 |

Public Key Cryptosystems | 33 |

A public key cryptosystem based on elliptic curves over ZnZ | 49 |

Copyright | |

8 other sections not shown

### Other editions - View all

Advances in Cryptology — EUROCRYPT ’96: International Conference on the ... Ueli Maurer No preview available - 1996 |

### Common terms and phrases

Advances in Cryptology adversary algorithm Alice assume attack binary blobs block boolean functions bound choose chosen ciphertext codes codeword coefficients commitment scheme Computer Science construction correlation cryptanalysis Crypto cryptographic cryptosystem decoding decryption defined denote designated verifier Desmedt discrete logarithm distribution efficient encryption equation EUROCRYPT exponentiation exponents factoring fingerprinting given hash function homomorphic IEEE input integer key bits key escrow keystream Lecture Notes Lemma linear linear cryptanalysis LNCS matrix method Micali mod q modular exponentiation modular multiplication modulo non-interactive nonlinearity Notes in Computer output parameter plaintext polynomial-time prime probabilistic probability problem proof protocol prove public key query random S-box safe primes secret key secret sharing scheme Section sequence session key signature scheme simulator smart card Springer-Verlag square root stream ciphers techniques Theorem threshold scheme transformation Ueli Maurer undeniable signatures variables vector verifiable secret sharing zero zero-knowledge