## Lectures on Data Security: Modern Cryptology in Theory and Practice, Issue 1561In July 1998, a summer school in cryptology and data security was organized atthecomputersciencedepartmentofAarhusUniversity, Denmark.Thistook place as a part of a series of summer schools organized by the European Edu- tional Forum, an organizationconsisting of the researchcenters TUCS (Finland), IPA(Holland)andBRICS(Denmark, Aarhus).Thelocalorganizingcommittee consisted of Jan Camenisch, Janne Christensen, Ivan Damga? ard (chair), Karen Moller, andLouisSalvail.ThesummerschoolwassupportedbytheEuropean Union. Modern cryptology is an extremely fast growing ?eld and is of fundamental importance in very diverse areas, from theoretical complexity theory to practical electroniccommerceontheInternet.Wethereforesetouttoorganizeaschool that would enable young researchers and students to obtain an overview of some mainareas, coveringboththeoreticalandpracticaltopics.Itisfairtosaythat the school was a success, both in terms of attendance (136 participants from over20countries)andintermsofcontents.Itisapleasuretothankallofthe speakers for their cooperation and the high quality of their presentations. A total of 13 speakers gave talks: Mihir Bellare, University of California, San Diego; Gilles Brassard, University of Montreal; David Chaum, DigiCash; Ronald Cramer, ETH Zur ] ich; Ivan Damg? ard, BRICS; Burt Kaliski, RSA Inc.; Lars Knudsen, Bergen University; Peter Landrock, Cryptomathic; Kevin Mc- Curley, IBM Research, Almaden; Torben Pedersen, Cryptomathic; Bart Preneel, Leuven University; Louis Salvail, BRICS; Stefan Wolf, ETH Zur ] ich. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

PracticeOriented ProvableSecurity | 1 |

Introduction to Secure Computation | 16 |

Commitment Schemes and ZeroKnowledge Protocols | 63 |

Emerging Standards for PublicKey Cryptography | 87 |

Contemporary Block Ciphers | 105 |

Primality Tests and Use of Primes in Public Key Systems | 127 |

Signing Contracts and Paying Electronically | 134 |

The State of Cryptographic Hash Functions | 158 |

The Search for the Holy Grail in Quantum Cryptography | 183 |

Unconditional Security in Cryptography | 217 |

### Other editions - View all

Lectures on Data Security: Modern Cryptology in Theory and Practice Ivan Damgard Limited preview - 2003 |

Lectures on Data Security: Modern Cryptology in Theory and Practice, Issue 1561 Ivan Damgard No preview available - 1999 |

### Common terms and phrases

Advances in Cryptology adversary algorithm Alice and Bob applications assume assumption atomic primitive Bellare block ciphers Brassard channel chosen ciphertext coin toss collision resistant commitment scheme complete measurement Computer Science construction Crépeau cryptanalysis Crypto cryptography cryptosystems Damg˚ard dealer defined definition denote digital signatures distribution efficient encryption example given Goldreich hash function honest players IEEE input ISO/IEC Lecture Notes linear malicious attacks Micali modulus Notes in Computer oblivious transfer one-way functions outcome output party permutation plaintext polynomial possible preimage prime private key probabilistic probability problem Proc Proceedings proof system provable security prove public key public-key cryptography puriﬁcation quantum bit commitment quantum cryptography Rabin random bits random oracle random variable receiver result secret sharing scheme sender sends signature scheme Springer-Verlag standards string subset techniques Theorem UOWHF vector verifier zero-knowledge zero-knowledge proof