Online Library TheLib.net » Advances in Cryptology — AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques Gold Coast, Queensland, Australia, December 13–16, 1992 Proceedings
cover of the book Advances in Cryptology — AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques Gold Coast, Queensland, Australia, December 13–16, 1992 Proceedings

Ebook: Advances in Cryptology — AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques Gold Coast, Queensland, Australia, December 13–16, 1992 Proceedings

00
27.01.2024
0
0

This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.




This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.


This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.
Content:
Front Matter....Pages -
Threshold cryptosystems....Pages 1-14
Authentication codes with perfect protection....Pages 15-26
Practical proven secure authentication with arbitration....Pages 27-32
Authentication codes under impersonation attack....Pages 33-47
Cumulative arrays and geometric secret sharing schemes....Pages 48-55
Nonperfect secret sharing schemes....Pages 56-66
A construction of practical secret sharing schemes using linear block codes....Pages 67-79
HAVAL — A one-way hashing algorithm with variable length of output (extended abstract)....Pages 81-104
On the power of memory in the design of collision resistant hash functions....Pages 105-121
A practical digital multisignature scheme based on discrete logarithms (extended abstract)....Pages 122-132
Group-oriented undeniable signature schemes without the assistance of a mutually trusted party....Pages 133-142
Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract)....Pages 143-155
Linear nonequivalence versus nonlinearity....Pages 156-164
Constructing large cryptographically strong S-boxes....Pages 165-181
Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept....Pages 183-195
Cryptanalysis of LOKI 91....Pages 196-208
Cryptanalysis of summation generator....Pages 209-215
Secure addition sequence and its applications on the server-aided secret computation protocols....Pages 217-230
Subliminal channels for signature transfer and their application to signature distribution schemes....Pages 231-243
A practical secret voting scheme for large scale elections....Pages 244-251
Privacy for multi-party protocols....Pages 252-260
New protocols for electronic money....Pages 261-274
Modelling and analyzing cryptographic protocols using Petri nets....Pages 275-295
On verifiable implicit asking protocols for RSA computation....Pages 296-307
Modified Maurer-Yacobi's scheme and its applications....Pages 308-323
The vulnerability of geometric sequences based on fields of odd characteristic....Pages 325-338
A fast cryptographic checksum algorithm based on stream ciphers....Pages 339-348
An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure....Pages 349-356
Construction of m-ary de Bruijn sequences (extended abstract)....Pages 357-363
Information technology security standards — An Australian perspective....Pages 365-384
Non-interactive generation of shared pseudorandom sequences....Pages 385-396
A generalized description of DES-based and Benes-based permutationgenerators....Pages 397-409
Prime generation with the Demytko-Miller-Trbovich algorithm....Pages 411-421
Constructions of feebly-one-way families of permutations....Pages 422-434
On bit correlations among preimages of “Many to one” One-way functions....Pages 435-446
The fast cascade exponentiation algorithm and its applications on cryptography....Pages 447-456
The design of a conference key distribution system....Pages 457-466
Remarks on “The design of a Conference Key Distribution System”....Pages 467-468
Public-key cryptosystem based on the discrete logarithm problem....Pages 469-476
The probability Distribution of the Diffie-Hellman Key....Pages 477-491
A modular exponentiation unit based on systolic arrays....Pages 492-504
A comparison of key distribution patterns constructed from circle geometries....Pages 505-516
A block cipher method using combinations of different methods under the control of the user key....Pages 517-527
An attack on two hash functions by Zheng-Matsumoto-Imai....Pages 529-534
Primality testing with Lucas functions....Pages 535-538
Back Matter....Pages 539-542
....Pages -
Download the book Advances in Cryptology — AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques Gold Coast, Queensland, Australia, December 13–16, 1992 Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen