|
" Advances in Cryptology CRYPTO '96 : "
Jaime G Carbonell
Document Type
|
:
|
BL
|
Record Number
|
:
|
746756
|
Doc. No
|
:
|
b566706
|
Main Entry
|
:
|
Jaime G Carbonell
|
Title & Author
|
:
|
Advances in Cryptology CRYPTO '96 : : 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18-22, 1996 Proceedings.\ Jaime G Carbonell
|
Publication Statement
|
:
|
Berlin/Heidelberg : Springer Berlin Heidelberg, 1996
|
Page. NO
|
:
|
(427 pages)
|
ISBN
|
:
|
3540686975
|
|
:
|
: 9783540686972
|
Contents
|
:
|
Lecture Notes in Computer Science; Advances in Cryptology --; CRYPTO '96; Copyright; Preface; CRYPTO '96; Contents; Keying Hash Functions for Message Authentication★; Universal Hashing and Multiple Authentication; Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings ★; Asymmetric Cryptography with a Hidden Monomial; Anonymous Communication and Anonymous Cash; Weaknesses in Some Threshold Cryptosystems; Hidden Collisions on DSS; The Dark Side of "Black-Box" Cryptography or: Should We Trust Capstone? Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsAll Bits in ax + b mod p are Hard; Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes; Security of 2t-Root Identification and Signatures; Robust and Efficient Sharing of RS A Functions; New Generation of Secure and Practical RSA-Based Signatures; Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers; Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing; Improved Differential Attacks on RC5. Improving Implementable Meet-in-the-Middle Attacks by Orders of MagnitudeKey-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES; How to Protect DES Against Exhaustive Key Search; Diffie-Hellman Oracles; Algorithms for Black-Box Fields and their Application to Cryptography; Fast Hashing on the Pentium; On Fast and Provably Secure Message Authentication Based on Universal Hashing; Quantum Cryptography over Underground Optical Fibers; Quantum Key Distribution and String Oblivious Transfer in Noisy Channels; Linear Complexity of Periodic Sequences: A General Theory. Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution; New Results on Visual Cryptography; Author Index.
|
Added Entry
|
:
|
Gerhard Goos
|
|
:
|
Jaime G Carbonell
|
|
:
|
Jörg Siekmann
|
| |