Advances in cryptology - EUROCRYPT '90. Workshop on the theory and application of cryptographic techniques. Aarhus, Denmark, May 21-24, 1990. Proceedings (Q1202080)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Advances in cryptology - EUROCRYPT '90. Workshop on the theory and application of cryptographic techniques. Aarhus, Denmark, May 21-24, 1990. Proceedings |
scientific article; zbMATH DE number 108186
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Advances in cryptology - EUROCRYPT '90. Workshop on the theory and application of cryptographic techniques. Aarhus, Denmark, May 21-24, 1990. Proceedings |
scientific article; zbMATH DE number 108186 |
Statements
Advances in cryptology - EUROCRYPT '90. Workshop on the theory and application of cryptographic techniques. Aarhus, Denmark, May 21-24, 1990. Proceedings (English)
0 references
23 January 1993
0 references
The articles of this volume will be reviewed individually. Indexed articles: \textit{Burmester, Mike V. D.; Desmedt, Yvo}, All languages in NP have divertible zero-knowledge proofs and arguments under cryptographic assumptions, 1-10 [Zbl 0788.68037] \textit{Davida, George; Desmedt, Yvo; Peralta, René}, On the importance of memory resources in the security of key exchange protocols, 11-15 [Zbl 0788.68038] \textit{Shinozaki, S.; Itoh, T.; Fujioka, A.; Tsujii, S.}, Provably secure key-updating schemes in identity-based systems, 16-30 [Zbl 0788.68041] \textit{De Santis, Alfredo; Persiano, Giuseppe}, Public-randomness in public-key cryptography, 46-62 [Zbl 0767.94007] \textit{Brickell, Ernest F.; McCurley, Kevin S.}, An interactive identification scheme based on discrete logarithms and factoring, 63-71 [Zbl 0788.68036] \textit{Lenstra, Arjen K.; Manasse, Mark S.}, Factoring with two large primes, 72-82 [Zbl 0779.11061] \textit{Evertse, Jan-Hendrik; van Heyst, Eugène}, Which new RSA signatures can be computed from some given RSA signatures?, 83-97 [Zbl 0788.68039] \textit{Scheidler, Renate; Buchmann, Johannes A.; Williams, Hugh C.}, Implementation of a key exchange protocol using real quadratic fields, 98-109 [Zbl 0797.68053] \textit{Morain, François}, Distributed primality proving and the primality of \((2^{3539} +1)/3\), 110-123 [Zbl 0779.11063] \textit{Lloyd, Sheelagh}, Properties of binary functions, 124-139 [Zbl 0768.94010] \textit{Pieprzyk, Josef}, How to construct pseudorandom permutations from single pseudorandom functions, 140-150 [Zbl 0779.65005] \textit{Nyberg, Kaisa}, Constructions of bent functions and difference sets, 151-160 [Zbl 0767.05031] \textit{Preneel, Bart; Van Leekwijck, Werner; Van Linden, Luc; Govaerts, René; Vandewalle, Joos}, Propagation characteristics of Boolean functions, 161-173 [Zbl 0764.94024] \textit{Niederreiter, Harald}, The linear complexity profile and the jump complexity of keystream sequences, 174-188 [Zbl 0764.94013] \textit{Dai, Zong-Duo; Beth, Thomas; Gollmann, Dieter}, Lower bounds for the linear complexity of sequences over residue rings, 189-195 [Zbl 0764.94009] \textit{Jansen, Cees J. A.}, On the construction of run permuted sequences, 196-203 [Zbl 0764.94010] \textit{Meier, Willi; Staffelbach, Othmar}, Correlation properties of combiners with memory in stream ciphers, 204-213 [Zbl 0764.94012] \textit{Chan, Agnes Hui; Goresky, Mark; Klapper, Andrew}, Correlation functions of geometric sequences, 214-221 [Zbl 0764.94008] \textit{Yacobi, Y.}, Exponentiating faster with addition chains, 222-229 [Zbl 0764.94005] \textit{Dussé, Stephen R.; Kaliski, Burton S. jun.}, A cryptographic library for the Motorola DSP56000, 230-244 [Zbl 0825.94173] \textit{Orup, Holger; Svendsen, Erik; Andreasen, Erik}, VICTOR and efficient RSA hardware implementation, 245-252 [Zbl 0825.94296] \textit{Sgarro, Andrea}, Lower bounds for authentication codes with splitting, 283-293 [Zbl 0825.94188] \textit{Beutelspacher, Albrecht; Rosenbaum, Ute}, Essentially \(\ell{}\)-fold secure authentication systems, 294-305 [Zbl 0789.68045] \textit{Smeets, Ben; Vanroose, Peter; Wan, Zhexian}, On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order \(L\geq 2\), 306-312 [Zbl 0764.94021] \textit{Stern, Jacques; Toffin, Philippe}, Cryptanalysis of a public-key cryptosystem based on approximations by rational numbers, 313-317 [Zbl 0825.94205] \textit{van Oorschot, Paul C.; Wiener, Michael J.}, A known-plaintext attack on two-key triple encryption, 318-325 [Zbl 0825.94175] \textit{Miyaguchi, Shoji; Ohta, Kazuo; Iwata, Masahiko}, Confirmation that some hash functions are not collision free, 326-343 [Zbl 0789.68049] \textit{Bauspieß, Fritz; Knobloch, Hans-Joachim; Wichmann, Peer}, Inverting the pseudo exponentiation, 344-351 [Zbl 0825.94186] \textit{Hwang, Tzonelih}, Cryptosystem for group oriented cryptography, 352-360 [Zbl 0825.94183] \textit{Maurer, Ueli M.}, A provably-secure strongly-randomized cipher, 361-373 [Zbl 0764.94018] \textit{Kurosawa, Kaoru; Katayama, Yutaka; Ogata, Wakaha; Tsujii, Shigeo}, General public key residue cryptosystems and mental poker protocols, 374-388 [Zbl 0764.94016] \textit{Lai, Xuejia; Massey, James L.}, A proposal for a new block encryption standard, 389-404 [Zbl 0764.94017] \textit{Niemi, Valtteri}, A new trapdoor in knapsacks, 405-411 [Zbl 0825.94176] \textit{De Santis, Alfredo; Yung, Moti}, On the design of provably-secure cryptographic hash functions, 412-431 [Zbl 0764.94020] \textit{Ong, H.; Schnorr, C. P.}, Fast signature generation with a Fiat Shamir-like scheme, 432-440 [Zbl 0764.94019] \textit{Bleumer, Gerrit; Pfitzmann, Birgit; Waidner, Michael}, A remark on a signature scheme where forgery can be proved, 441-445 [Zbl 0825.94177] \textit{Ohta, Kazuo; Okamoto, Tatsuaki; Koyama, Kenji}, Membership authentication for hierarchical multigroups using the extended Fiat-Shamir scheme, 446-457 [Zbl 0825.94202] \textit{Guillou, Louis Claude; Quisquater, Jean-Jacques}, Precautions taken against various potential attacks \textit{in ISO/IEC DIS 9796 ``Digital signature scheme giving message recovery''}, 465-473 [Zbl 0825.94198] \textit{Golić, Jovan Dj.; Mihaljević, Miodrag J.}, A noisy clock-controlled shift register cryptanalysis concept based on sequence comparison approach, 487-491 [Zbl 0825.94169] \textit{Meister, Gisela}, On an implementation of the Mohan-Adiga algorithm, 496-500 [Zbl 0825.94190]
0 references
Aarhus (Denmark)
0 references
Cryptology
0 references
EUROCRYPT '90
0 references
Cryptographic techniques
0 references
Workshop
0 references
Proceedings
0 references