## Advances in cryptology, EUROCRYPT '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 : proceedingsThis volume constitutes the proceedings of EUROCRYPT '95, the 1995 International Workshop on the Theory and Application of Cryptographic Techniques, held in Saint-Malo, France in May 1995 under the sponsorship of the International Association for Cryptologic Research (IACR). The volume contains revised versions of the 33 papers selected from a total of 113 submissions. All current aspects of cryptologic research and advanced applications are addressed; there are sections on cryptanalysis, signatures, computational number theory, cryptographic protocols, secret sharing, electronic cash, shift registers and Boolean functions, authentication codes, new schemes, complexity aspects, and implementation aspects. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

Cryptanalysis | 1 |

A generalization of linear cryptanalysis and the applicability of Matsuis | 24 |

Signatures | 39 |

Copyright | |

13 other sections not shown

### Other editions - View all

### Common terms and phrases

3PASS A-code access structure Advances in Cryptology adversary Alice assume attack authentication blind signature Blum integer bound broadcast Chaum ciphers ciphertext codes codeword coefficient coin commitment scheme Computer Science construction correlation CRYPTO cryptographic cryptosystems dealer decryption defined definition denote digital signature discrete logarithm distribution efficient elliptic curves encryption EUROCRYPT FCSR feedback polynomial given hash functions I/O sum imbalance information dispersal algorithm input keystream lattice Lecture Notes Lemma LFSR linear cryptanalysis LNCS matrix mod q modulo multiplications non-interactive nonlinear nonzero Notes in Computer Oblivious Transfer output pair participants polynomial preprocessing probability problem Proceedings properties prove public key quadratic randomly receiver residuosity resilient functions round Schnorr secret key secret sharing scheme Section secure sender sends sharing protocol shrunk polynomials signature issuing protocol signer simulator Springer Springer-Verlag string subset sum subset sum problems technique Theorem threefold sums untraceability vector verifier