Online Library TheLib.net » Advances in Cryptology — CRYPT0’ 95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27–31, 1995 Proceedings
cover of the book Advances in Cryptology — CRYPT0’ 95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27–31, 1995 Proceedings

Ebook: Advances in Cryptology — CRYPT0’ 95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27–31, 1995 Proceedings

00
27.01.2024
0
0

The Crypto ’95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. It took place at the University of California, Santa Barbara, from August 27-31, 1995. This was the fifteenth annual Crypto conference; all have been held at UCSB. For the second time, proceedings were available at the conference. The General Chair, Stafford Tavares, was responsible for local organization and registration. The Program Committee considered 151 papers and selected 36 for pres- tation. There were also two invited talks. Robert Morris, Sr. gave a talk on “Ways of Losing Information,” which included some non-cryptographic means of leaking secrets that are often overlooked by cryptographers. The second talk, “Cryptography - Myths and Realities,” was given by Adi Shamir, this year’s IACR Distinguished Lecturer. Shamir is the second person to receive this honor, the first having been Gus Simmons at Crypto ’94. These proceedings contain revised versions of the 36 contributed talks. Each paper was sent to at least three members of the program committee for c- ments. Revisions were not checked on their scientific aspects. Some authors will write final versions of their papers for publication in refereed journals. Of course, the authors bear full responsibility for the contents of their papers.




This book presents the proceedings of the 15th Annual International Cryptology Conference, CRYPTO '95, held in Santa Barbara, California in August 1995.
This proceedings contain revised full versions of 36 papers selected during a highly competitive refereeing process from a total of 151 submissions. All current topics in cryptology research and advanced applications are addressed; The papers are organized in sections on MAC and hash, number theory, oblivious transfer, cryptanalysis, key escrow, protocols, zero knowledge and interactive protocols, secret sharing, and everything else.


This book presents the proceedings of the 15th Annual International Cryptology Conference, CRYPTO '95, held in Santa Barbara, California in August 1995.
This proceedings contain revised full versions of 36 papers selected during a highly competitive refereeing process from a total of 151 submissions. All current topics in cryptology research and advanced applications are addressed; The papers are organized in sections on MAC and hash, number theory, oblivious transfer, cryptanalysis, key escrow, protocols, zero knowledge and interactive protocols, secret sharing, and everything else.
Content:
Front Matter....Pages I-XII
MDx-MAC and Building Fast MACs from Hash Functions....Pages 1-14
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions....Pages 15-28
Bucket Hashing and its Application to Fast Message Authentication....Pages 29-42
Fast Key Exchange with Elliptic Curve Systems....Pages 43-56
Fast Server-Aided RSA Signatures Secure Against Active Attacks....Pages 57-69
Security and Performance of Server-Aided RSA Computation Protocols....Pages 70-83
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver....Pages 84-96
Precomputing Oblivious Transfer....Pages 97-109
Committed Oblivious Transfer and Private Multi-Party Computation....Pages 110-123
On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols....Pages 124-135
How to Break Shamir’s Asymmetric Basis....Pages 136-147
On the Security of the Gollmann Cascades....Pages 148-156
Improving the Search Algorithm for the Best Linear Expression....Pages 157-170
On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm....Pages 171-184
A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Key Escrow Systems....Pages 185-196
A Key Escrow System with Warrant Bounds....Pages 197-207
Fair Cryptosystems, Revisited....Pages 208-221
Escrow Encryption Systems Visited: Attacks, Analysis and Designs....Pages 222-235
Robustness Principles for Public Key Protocols....Pages 236-247
Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88....Pages 248-261
Cryptanalysis Based on 2-Adic Rational Approximation....Pages 262-273
A Key-schedule Weakness in SAFER K-64....Pages 274-286
Cryptanalysis of the Immunized LL Public Key Systems....Pages 287-296
Secure Signature Schemes based on Interactive Protocols....Pages 297-310
Improved Efficient Arguments....Pages 311-324
Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs....Pages 325-338
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage....Pages 339-352
Secret Sharing with Public Reconstruction....Pages 353-366
On General Perfect Secret Sharing Schemes....Pages 367-371
NFS with Four Large Primes: An Explosive Experiment....Pages 372-385
Some Remarks on Lucas-Based Cryptosystems....Pages 386-396
Threshold DSS Signatures without a Trusted Party....Pages 397-409
Quantum Cryptanalysis of Hidden Linear Functions....Pages 410-423
An Efficient Divisible Electronic Cash Scheme....Pages 424-437
Collusion-Secure Fingerprinting for Digital Data....Pages 438-451
Back Matter....Pages 452-465
....Pages 467-467
Download the book Advances in Cryptology — CRYPT0’ 95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27–31, 1995 Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen