Table of contents for issues of Lecture Notes in Computer Science

Last update: Sat Jul 29 16:37:40 MDT 2017                Valid HTML 3.2!

Volume 434, 1990
Volume 435, 1990


Lecture Notes in Computer Science
Volume 434, 1990

               Whitfield Diffie   The Adolescence of Public-Key
                                  Cryptography (Invited) . . . . . . . . . 2
                  Zvi Galil and   
               Stuart Haber and   
                      Moti Yung   A Secure Public-Key Authentication
                                  Scheme . . . . . . . . . . . . . . . . . 3
                Gilles Brassard   How to Improve Signature Schemes . . . . 16
                  W. J. Jaburek   A Generalization of El Gamal's Public
                                  Key Cryptosystem . . . . . . . . . . . . 23
      Christoph G. Günther   An Identity-Based Key-Exchange Protocol  29
       Fritz Bauspieß and   
          Hans-Joachim Knobloch   How to Keep Authenticity Alive in a
                                  Computer Network . . . . . . . . . . . . 38
             Hartmut Isselhorst   The Use of Fractions in Public-Key
                                  Cryptosystems  . . . . . . . . . . . . . 47
                   Yair Frankel   A Practical Protocol for Large Group
                                  Oriented Networks  . . . . . . . . . . . 56
                 Sheelagh Lloyd   Counting Functions Satisfying a Higher
                                  Order Strict Avalanche Criterion . . . . 63
           George I. Davida and   
                Yvo Desmedt and   
            René Peralta   A Key Distribution System Based on Any
                                  One-Way Function (Extended Abstract) . . 75
       Józef P. Pieprzyk   Non-linearity of Exponent Permutations   80
                  Andrea Sgarro   Informational Divergence Bounds for
                                  Authentication Codes . . . . . . . . . . 93
    Jean-Jacques Quisquater and   
                   Marc Girault   $ 2 n $-Bit Hash-Functions Using $n$-Bit
                                  Symmetric Block Cipher Algorithms  . . . 102
        Stig F. Mjòlsnes   A Simple Technique for Diffusing
                                  Cryptoperiods  . . . . . . . . . . . . . 110
       Mike V. D. Burmester and   
                Yvo Desmedt and   
                 Fred Piper and   
                 Michael Walker   A General Zero-Knowledge Scheme  . . . . 122
           Tatsuaki Okamoto and   
                     Kazuo Ohta   Divertible Zero Knowledge Interactive
                                  Proofs and Commutative Random
                                  Self-Reducibility  . . . . . . . . . . . 134
          Claude Crépeau   Verifiable Disclose for Secrets and
                                  Applications (Abstract)  . . . . . . . . 150
                 Joan Boyar and   
             Katalin Friedl and   
                   Carsten Lund   Practical Zero-Knowledge Proofs: Giving
                                  Hints and Using Deficiencies . . . . . . 155
                  Jacques Stern   An Alternative to the Fiat--Shamir
                                  Protocol . . . . . . . . . . . . . . . . 173
            Gilles Brassard and   
          Claude Crépeau   Sorting Out Zero-Knowledge . . . . . . . 181
            Gilles Brassard and   
      Claude Crépeau and   
                      Moti Yung   Everything in NP Can Be Argued in \em
                                  Perfect Zero-Knowledge in a \em Bounded
                                  Number of Rounds (Extended Abstract) . . 192
                      Moti Yung   Zero-Knowledge Proofs of Computational
                                  Power (Extended Summary) . . . . . . . . 196
                  Bert den Boer   More Efficient Match-Making and
                                  Satisfiability: \em The Five Card Trick  208
André Vandemeulebroecke and   
       Etienne Vanzieleghem and   
               Tony Denayer and   
             Paul G. A. Jespers   A Single Chip 1024 Bits RSA Processor    219
                  Hedwig Cnudde   Cryptel --- The Practical Protection of
                                  an Existing Electronic Mail System . . . 237
               Jan Van Auseloos   Technical Security: The Starting Point   243
                  Charles Siuda   Security in Open Distributed Processing  249
            Joos Vandewalle and   
                David Chaum and   
                Walter Fumy and   
          Cees J. A. Jansen and   
             Peter Landrock and   
                   G. Roelofsen   A European Call for Cryptographic
                                  Algorithms: RIPE: Race Integrity
                                  Primitives Evaluation  . . . . . . . . . 267
           Mireille Antoine and   
Jean-François Brakeland and   
                  Marc Eloy and   
                   Yves Poullet   Legal Requirements Facing New Signature
                                  Technology (Invited) . . . . . . . . . . 273
                    David Chaum   Online Cash Checks . . . . . . . . . . . 288
                David Chaum and   
              Bert den Boer and   
         Eug\`ene van Heyst and   
    Stig F. Mjòlsnes and   
                 Adri Steenbeek   Efficient Offline Electronic Checks
                                  (Extended Abstract)  . . . . . . . . . . 294
                Michael Waidner   Unconditional Sender and Recipient
                                  Untraceability in spite of Active
                                  Attacks  . . . . . . . . . . . . . . . . 302
           Jurjen N. E. Bos and   
                  Bert den Boer   Detection of Disrupters in the DC
                                  Protocol . . . . . . . . . . . . . . . . 320
          Philippe Flajolet and   
              Andrew M. Odlyzko   Random Mapping Statistics (Invited)  . . 329--354
           Arjen K. Lenstra and   
                Mark S. Manasse   Factoring by Electronic Mail . . . . . . 355
              Michael J. Wiener   Cryptanalysis of Short RSA Secret
                                  Exponents (Abstract) . . . . . . . . . . 372
           Birgit Pfitzmann and   
              Andreas Pfitzmann   How to Break the Direct
                                  RSA-Implementation of MIXes  . . . . . . 373
            Hakon N. Jendal and   
            Yves J. B. Kuhn and   
                James L. Massey   An Information-Theoretic Treatment of
                                  Homophonic Substitution  . . . . . . . . 382
                  Peer Wichmann   Cryptanalysis of a Modified Rotor
                                  Machine  . . . . . . . . . . . . . . . . 395
         Michael Bertilsson and   
         Ernest F. Brickell and   
            Ingemar Ingemarsson   Cryptanalysis of Video Encryption Based
                                  on Space-Filling Curves  . . . . . . . . 403
              Yuliang Zheng and   
          Tsutomu Matsumoto and   
                    Hideki Imai   Impossibility and Optimally Results on
                                  Constructing Pseudorandom Permutations
                                  (Extended Abstract)  . . . . . . . . . . 412
              Rainer A. Rueppel   On the Security of Schnorr's Pseudo
                                  Random Generator . . . . . . . . . . . . 423
    Jean-Jacques Quisquater and   
          Jean-Paul Delescaille   How Easy is Collision Search?
                                  Application to DES (Extended Summary)    429
            Gustavus J. Simmons   Prepositioned Shared Secret and/or
                                  Shared Control Schemes (Invited) . . . . 436
             Ernest F. Brickell   Some Ideal Secret Sharing Schemes  . . . 468
           Marijke De Soete and   
               Klaus Vedder and   
                 Michael Walker   Cartesian Authentication Schemes . . . . 476
         Albrecht Beutelspacher   How to Say ``No''  . . . . . . . . . . . 491
         Philippe Godlewski and   
                 Chris Mitchell   Key Minimal Authentication Systems for
                                  Unconditional Secrecy  . . . . . . . . . 497
      Christoph G. Günther   Parallel Generation of Recurring
                                  Sequences  . . . . . . . . . . . . . . . 503
            Harald Niederreiter   Keystream Sequences with a Good Linear
                                  Complexity Profile for Every Starting
                                  Point  . . . . . . . . . . . . . . . . . 523
                Thomas Beth and   
                   Zong-Duo Dai   On the Complexity of Pseudo-random
                                  Sequences --- or: If You Can Describe a
                                  Sequence It Can't Be Random  . . . . . . 533
               Zong-Duo Dai and   
                  Kencheng Zeng   Feedforward Functions Defined by de
                                  Brujin Sequences . . . . . . . . . . . . 544
                Willi Meier and   
             Othmar Staffelbach   Nonlinearity Criteria for Cryptographic
                                  Functions  . . . . . . . . . . . . . . . 549
             Agnes Hui Chan and   
               Mark Goresky and   
                 Andrew Klapper   On the Linear Complexity of Feedback
                                  Registers (Extended Abstract)  . . . . . 563
                   Muzhong Wang   Linear Complexity Profiles and Continued
                                  Fractions  . . . . . . . . . . . . . . . 571
     Réjane Forré   A Fast Correlation Attack on Nonlinearly
                                  Feed-Forward Filtered Shift-Register
                                  Sequences  . . . . . . . . . . . . . . . 586
       Johannes A. Buchmann and   
      Stephen Düllmann and   
               Hugh C. Williams   On the Complexity and Efficiency of a
                                  New Key Exchange System  . . . . . . . . 597
                     Colin Boyd   A New Multiple Key Cipher and an
                                  Improved Voting Scheme . . . . . . . . . 617
         François Morain   Atkin's Test: News from the Front  . . . 626
                 Ueli M. Maurer   Fast Generation of Secure RSA-Moduli
                                  with Almost Maximal Diversity  . . . . . 636
                    Yves Duhoux   Deciphering Bronze Age Scripts of Crete
                                  --- The Case of Linear A (Invited) . . . 649--650
                 Wieb Bosma and   
        Marc Paul van der Hulst   Faster Primality Testing (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 652
             Tzonelih Hwang and   
                   T. R. N. Rao   Private-Key Algebraic-Code Cryptosystems
                                  with High Information Rates  . . . . . . 657
    Jean-Jacques Quisquater and   
         André Bouckaert   Zero-Knowledge Procedures for
                                  Confidential Access to Medical Records
                                  (Extended Summary) . . . . . . . . . . . 662
     Josep Domingo i Ferrer and   
 Llorenç Huguet i Rotger   Full Secure Key Exchange and
                                  Authentication with No Previously Shared
                                  Secrets  . . . . . . . . . . . . . . . . 665
                  Yves Roggeman   Varying Feedback Shift Registers . . . . 670
            Dieter Gollmann and   
            William G. Chambers   A Cryptanalysis of $ \mbox {Step}_{k, m}
                                  $-Cascades . . . . . . . . . . . . . . . 680
               Claus P. Schnorr   Efficient Identification and Signatures
                                  for Smart Cards (Abstract) . . . . . . . 688
            Michael Waidner and   
               Birgit Pfitzmann   The Dining Cryptographers in the Disco:
                                  Unconditional Sender and Recipient
                                  Untraceability with Computationally
                                  Secure Serviceability (Abstract) . . . . 690
                    Glyn Carter   Some Conditions on the Linear Complexity
                                  Profiles of Certain Binary Sequences . . 691
             Lawrence Brown and   
               Jennifer Seberry   On the Design of Permutation $ {P} $ in
                                  DES Type Cryptosystems . . . . . . . . . 696
            Gordon B. Agnew and   
               R. C. Mullin and   
              Scott A. Vanstone   A Fast Elliptic Curve Cryptosystem . . . 706
                      Anonymous   Author Index . . . . . . . . . . . . . . 709


Lecture Notes in Computer Science
Volume 435, 1990

                     David Kahn   Keying the German Navy's Enigma
                                  (Invited)  . . . . . . . . . . . . . . . 2
                    Yvo Desmedt   Making Conditionally Secure
                                  Cryptosystems Unconditionally Abuse-Free
                                  in a General Context (Extended Abstract) 6
      Ivan Bjerre Damgård   On the Existence of Bit Commitment
                                  Schemes and Zero-Knowledge Proofs  . . . 17
               Russell L. Brand   Problems with the Normal Use of
                                  Cryptography for Providing Security on
                                  Unclassified Networks (Invited)  . . . . 30
                   John T. Kohl   The Use of Encryption in Kerberos for
                                  Network Authentication (Invited) . . . . 35
         David C. Feldmeier and   
                 Philip R. Karn   UNIX Password Security --- Ten Years
                                  Later (Invited)  . . . . . . . . . . . . 44
              Jonathan M. Smith   Practical Problems with a Cryptographic
                                  Protection Scheme (Invited)  . . . . . . 64
               Paul Barrett and   
                 Raymund Eisele   The Smart Diskette --- A Universal User
                                  Token and Personal Crypto-Engine
                                  (Invited)  . . . . . . . . . . . . . . . 74
             Agnes Hui Chan and   
               Richard A. Games   On the Quadratic Spans of Periodic
                                  Sequences  . . . . . . . . . . . . . . . 82
          Cees J. A. Jansen and   
                 Dick E. Boekee   The Shortest Feedback Shift Register
                                  that Can Generate a Given Sequence . . . 90
             Ueli M. Maurer and   
                James L. Massey   Perfect Local Randomness in
                                  Pseudo-random Sequences  . . . . . . . . 100
             Oded Goldreich and   
                  Hugo Krawczyk   Sparse Pseudorandom Distributions
                                  (Extended Abstract)  . . . . . . . . . . 113
                      Moni Naor   Bit Commitment Using Pseudo-randomness
                                  (Extended Abstract)  . . . . . . . . . . 128
                  Hugo Krawczyk   How to Predict Congruential Generators   138--153
               Bart Preneel and   
          Antoon Bosselaers and   
       René Govaerts and   
                Joos Vandewalle   A Chosen Text Attack on the Modified
                                  Cryptographic Checksum Algorithm of
                                  Cohen and Huang  . . . . . . . . . . . . 154
              Kencheng Zeng and   
                 C. H. Yang and   
                   T. R. N. Rao   On the Linear Consistency Test (LCT) in
                                  Cryptanalysis with Applications  . . . . 164
                      Amos Fiat   Batch RSA  . . . . . . . . . . . . . . . 175
             Andreas Bender and   
                 Guy Castagnoli   On the Implementation of Elliptic Curve
                                  Cryptosystems  . . . . . . . . . . . . . 186
              Mihir Bellare and   
               Shafi Goldwasser   New Paradigms for Digital Signatures and
                                  Message Authentication Based on
                                  Non-interactive Zero Knowledge Proofs    194
                David Chaum and   
             Hans van Antwerpen   Undeniable Signatures  . . . . . . . . . 212
                Ralph C. Merkle   A Certified Digital Signature (Subtitle:
                                  That Antique Paper from 1979)  . . . . . 218
               Claus P. Schnorr   Efficient Identification and Signatures
                                  for Smart Cards  . . . . . . . . . . . . 239
           Marijke De Soete and   
    Jean-Jacques Quisquater and   
                   Klaus Vedder   A Signature with Shared Verification
                                  Scheme . . . . . . . . . . . . . . . . . 253
                Shimon Even and   
             Oded Goldreich and   
                  Silvio Micali   On-Line/Off-Line Digital Signatures  . . 263
         Ernest F. Brickell and   
            Daniel M. Davenport   On the Classification of Ideal Secret
                                  Sharing Schemes (Extended Abstract)  . . 278
              Chi-Sung Laih and   
                  Lein Harn and   
               Jau-Yien Lee and   
                 Tzonelih Hwang   Dynamic Threshold Scheme Based on the
                                  Definition of Cross-Product in an
                                  $N$-Dimensional Linear Space . . . . . . 286
                 Benny Chor and   
               Eyal Kushilevitz   Secret Sharing over Infinite Domains
                                  (Extended Abstract)  . . . . . . . . . . 299
                Yvo Desmedt and   
                   Yair Frankel   Threshold Cryptosystems  . . . . . . . . 307
            Gerald C. Chick and   
            Stafford E. Tavares   Flexible Access Control with Master Keys 316
         Makoto Tatebayashi and   
          Natsume Matsuzaki and   
           David B. Newman, Jr.   Key Distribution Protocol for Digital
                                  Mobile Communication Systems . . . . . . 324
       Johannes A. Buchmann and   
               Hugh C. Williams   A Key Exchange System Based on Real
                                  Quadratic Fields (Extended Abstract) . . 335
               Yacov Yacobi and   
                 Zahava Shmuely   On Key Distribution Systems  . . . . . . 344
                Ruth Nelson and   
                   John Heimann   SDNS Architecture and End-to-End
                                  Encryption . . . . . . . . . . . . . . . 356
             Ernest F. Brickell   A Survey of Hardware Implementations of
                                  RSA (Invited), (Abstract)  . . . . . . . 368
            Paul A. Findlay and   
               Brian A. Johnson   Modular Exponentiation Using Recursive
                                  Sums of Residues . . . . . . . . . . . . 371
                  Hikaru Morita   A Fast Modular-Multiplication Algorithm
                                  Based on a Higher Radix  . . . . . . . . 387
           Jurjen N. E. Bos and   
             Matthijs J. Coster   Addition Chain Heuristics  . . . . . . . 400
    Jean-Jacques Quisquater and   
          Jean-Paul Delescaille   How Easy Is Collision Search. New
                                  Results and Applications to DES
                                  (Abstract and Results) . . . . . . . . . 408
      Ivan Bjerre Damgård   A Design Principle for Hash Functions    416
                Ralph C. Merkle   One Way Hash Functions and DES . . . . . 428
       Spyros S. Magliveras and   
                 Nasir D. Memon   Properties of Cryptosystem PGM . . . . . 447
              Yuliang Zheng and   
          Tsutomu Matsumoto and   
                    Hideki Imai   On the Construction of Block Ciphers
                                  Provably Secure and Not Relying on Any
                                  Unproved Hypotheses (Extended Abstract)  461
           Tatsuaki Okamoto and   
                     Kazuo Ohta   Disposable Zero-Knowledge
                                  Authentications and Their Applications
                                  to Untraceable Electronic Cash . . . . . 481
             Michael Ben-Or and   
           Shafi Goldwasser and   
                 Joe Kilian and   
                  Avi Wigderson   Efficient Identification Schemes Using
                                  Two Prover Interactive Proofs  . . . . . 498
                 Joan Boyar and   
            René Peralta   On the Concrete Complexity of
                                  Zero-Knowledge Proofs  . . . . . . . . . 507
                Uriel Feige and   
                     Adi Shamir   Zero Knowledge Proofs of Knowledge in
                                  Two Rounds . . . . . . . . . . . . . . . 526
                 Joe Kilian and   
              Silvio Micali and   
               Rafail Ostrovsky   Minimum Resource Zero-Knowledge Proofs
                                  (Extended Abstract)  . . . . . . . . . . 545
              Mihir Bellare and   
                  Silvio Micali   Non-interactive Oblivious Transfer and
                                  Applications . . . . . . . . . . . . . . 547
                  Donald Beaver   Multiparty Protocols Tolerating Half
                                  Faulty Processors  . . . . . . . . . . . 560
                  Richard Cleve   Controlled Gradual Disclosure Schemes
                                  for Random Bits and Their Applications   573
              Donald Beaver and   
               Shafi Goldwasser   Multiparty Computation with Faulty
                                  Majority . . . . . . . . . . . . . . . . 589
                    David Chaum   The Spymasters Double-Agent Problem:
                                  Multiparty Computations Secure
                                  Unconditionally from Minorities and
                                  Cryptographically from Majorities  . . . 591
              Mihir Bellare and   
               Lenore Cowen and   
               Shafi Goldwasser   On the Structure of Secret Key Exchange
                                  Protocols  . . . . . . . . . . . . . . . 604
                     Adi Shamir   An Efficient Identification Scheme Based
                                  on Permuted Kernels (Extended Abstract)  606
               Rafail Ostrovsky   An Efficient Software Protection Scheme
                                  (Abstract) . . . . . . . . . . . . . . . 610
          Carlisle M. Adams and   
            Stafford E. Tavares   Good S-Boxes Are Easy to Find  . . . . . 612
                 Steve R. White   Convert Distributed Processing with
                                  Computer Viruses . . . . . . . . . . . . 616
                   Wyn L. Price   Progress in Data Security
                                  Standardisation  . . . . . . . . . . . . 620
                Shoji Miyaguchi   The FEAL- 8 Cryptosystem and a Call for
                                  Attack . . . . . . . . . . . . . . . . . 624
    Jean-Jacques Quisquater and   
           Louis C. Guillou and   
               Thomas A. Berson   How to Explain Zero-Knowledge Protocols
                                  to Your Children . . . . . . . . . . . . 628
                      Anonymous   Author Index . . . . . . . . . . . . . . 633