×

Advances in cryptology – EUROCRYPT ‘97. Proceedings of the 16th International conference on the Theory and application of cryptographic techniques, Konstanz, Germany, May 11–15, 1997. (English) Zbl 0864.00083

Lecture Notes in Computer Science. 1233. Berlin: Springer. xi, 509 p. DM 106.00 (1997).
The articles of this volume will be reviewed individually. The preceding conference (1996) has been reviewed (see Zbl 0847.00051).
Table of contents (34 chapters):
Block Ciphers: Johan Borst, Lars R. Knudsen and Vincent Rijmen, Two attacks on reduced IDEA (1–13); Thilo Zieschang, Combinatorial properties of basic encryption operations (14–26).
Public Key Systems: David Naccache and Jacques Stern, A new public-key cryptosystem (27–36); Dan Boneh, Richard A. DeMillo, Richard J. Lipton, On the importance of checking cryptographic protocols for faults (37–51); Don Coppersmith and Adi Shamir, Lattice attacks on NTRU (52–61).
Protocols: Adam Young and Moti Yung, Kleptography: Using cryptography against cryptography (62–74); Ronald Cramer and Ivan Damgård, Fast and secure immunization against adaptive man-in-the-middle impersonation (75–87); Birgit Pfitzmann and Michael Waidner, Anonymous fingerprinting (88–102); Ronald Cramer, Rosario Gennaro and Berry Schoenmakers, A secure and optimally efficient multi-authority election scheme (103–118).
Key Escrow: Eric R. Verheul and Henk C. A. van Tilborg, Binding ElGamal: A fraud-detectable alternative to key-escrow proposals (119–133); Ross Anderson and Michael Roe, The GCHQ protocol and its problems (134–148).
Hash-Functions: Thomas Johansson, Bucket hashing with a small key size (149–162); Mihir Bellare and Daniele Micciancio, A new paradigm for collision-free hashing: incrementality at reduced cost (163–192).
Information Theory: Christian Cachin, Smooth entropy and Rényi entropy (193–208); Ueli Maurer, Information-theoretically secure secret-key agreement by NOT authenticated public discussion (209–225).
Stream Ciphers: Jovan Dj. Golić, Linear statistical weakness of alleged RC4 keystream generator (226–238); Jovan Dj. Golić, Cryptanalysis of alleged A5 stream cipher (239–255).
Complexity Theory: Victor Shoup, Lower bounds for discrete logarithms and related problems (256–266); R. Fischlin and C. P. Schnorr, Stronger security proofs for RSA and Rabin bits (267–279); Mihir Bellare, Markus Jakobsson and Moti Yung, Round-optimal zero-knowledge arguments based on any one-way function (280–305); Claude Crépeau, Efficient cryptographic protocols based on noisy channels (306–317); Stefan Brands, Rapid demonstration of linear relations connected by Boolean operators (318–333); Gilles Brassard and Claude Crépeau, Oblivious transfers and privacy amplification (334–347).
Implementation: Antoon Bosselaers, René Govaerts and Joos Vandewalle, SHA: a design for parallel architectures? (348–362); Christof Paar and Pedro Soria-Rodriguez, Fast arithmetic architectures for public-key algorithms over Galois fields \(\mathrm{GF}\left((2^n)^m\right)\) (363–378); Reynald Lercier, Finding good random elliptic curves for cryptosystems defined over \(\mathbb F_{2^n}\) (379–392).
Authentication: Marc Fischlin, Incremental cryptography and memory checkers (393–408); Kaoru Kurosawa, Thomas Johansson and Douglas Stinson, Almost \(k\)-wise independent sample spaces and their cryptologic applications (409–421).
Boolean Functions: Claude Carlet, More correlation-immune and resilient functions over Galois fields and Galois rings (422–433); Kaoru Kurosawa and Takashi Satoh, Design of SAC/PC\((l)\) of order \(k\) Boolean functions and three other cryptographic criteria (434–449).
Signatures: Markus Jakobsson and Moti Yung, Distributed “magic ink” signatures (450–464); Jan Camenisch, Efficient and generalized group signatures (465–479); Niko Barić and Birgit Pfitzmann, Collision-free accumulators and fail-stop signature schemes without trees (480–494); Marc Girault and Jean-François Misarsky, Selective forgery of RSA signatures using redundancy (495–507).

MSC:

00B25 Proceedings of conferences of miscellaneous specific interest
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
68-06 Proceedings, conferences, collections, etc. pertaining to computer science
94A60 Cryptography
68P25 Data encryption (aspects in computer science)

Citations:

Zbl 0847.00051
PDFBibTeX XMLCite
Full Text: DOI