𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Lecture Notes in Computer Science] Advances in Cryptology — ASIACRYPT '96 Volume 1163 || Conditional correlation attack on nonlinear filter generators

✍ Scribed by Kim, Kwangjo; Matsumoto, Tsutomu


Book ID
115488125
Publisher
Springer Berlin Heidelberg
Year
1996
Tongue
German
Weight
317 KB
Edition
1996
Category
Article
ISBN-13
9783540618720

No coin nor oath required. For personal study only.

✦ Synopsis


A Message Recovery Signature Scheme Equivalent To Dsa Over Elliptic Curves / Atsuko Miyaji -- Cryptographic Protocols Based On Real-quadratic A-fields / Ingrid Biehl, Bernd Meyer, Christoph Thiel -- Minding Your P's And Q's / Ross Anderson, Serge Vaudenay -- Authenticated Multi-party Key Agreement / Mike Just, Serge Vaudenay Cryptography And The Internet / Kevin S. Mccurley -- Generating Standard Dsa Signatures Without Long Inversion / Arjen K. Lenstra -- A Fast Software Implementation For Arithmetic Operations In Gf(2[superscript N]) / Erik De Win .. [et Al.] -- Hash Functions Based On Block Ciphers And Quaternary Codes / Lars Knudsen, Bart Preneel -- Generalized Feistel Networks / Kaisa Nyberg -- On Applying Linear Cryptanalysis To Idea / Philip Hawkes, Luke O'connor -- A Multi-recastable Ticket Scheme For Electronic Elections / Chun-i Fan, Chin-laung Lei -- Some Remarks On A Receipt-free And Universally Verifiable Mix-type Voting Scheme / Markus Michels, Patrick Horster --^ Observations On Non-repudiation / Jianying Zhou, Dieter Gollmann -- On The Efficiency Of One-time Digital Signatures / Daniel Bleichenbacher, Ueli Maurer -- A Hidden Cryptographic Assumption In No-transferable Identification Schemes / Kouichi Sakurai -- Electronic Money And Key Management From Global And Regional Points Of View / Shigeo Tsujii -- Limiting The Visible Space Visual Secret Sharing Schemes And Their Application To Human Identification / Kazukuni Kobara, Hideki Imai -- Towards Characterizing When Information-theoretic Secret Key Agreement Is Possible / Ueli Maurer, Stefan Wolf -- Key Sharing Based On The Wire-tap Channel Type Ii Concept With Noisy Main Channel / V. Korjik, D. Kushnir -- Generalization Of Higher Order Sac To Vector Output Boolean Functions / Kaoru Kurosawa, Takashi Satoh -- On The Correlation Immune Functions And Their Nonlinearity / Seongtaek Chee [and Others] -- How To Date Blind Signatures / Masayuki Abe, Eiichiro Fujisaki --^ Provably Secure Blind Signature Schemes / David Pointcheval, Jacques Stern -- Cost-effective Payment Schemes With Privacy Regulation / David M'raihi -- Mis-representation Of Identities In E-cash Schemes And How To Prevent It / Agnes Chan [and Others] -- Indirect Discourse Proofs / Yair Frankel, Yiannis Tsiounis, Moti Yung -- The Validation Of Cryptographic Algorithms / Jacques Stern -- Convertible Group Signatures / Seung Joo Kim, Sung Jun Park, Dong Ho Won -- How To Utilize The Transformability Of Digital Signatures For Solving The Oracle Problem / Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto -- On The Risk Of Disruption In Several Multiparty Signature Schemes / Markus Michels, Patrick Horster -- Correlation Attacks On Cascades Of Clock Controlled Shift Registers / Willi Geiselmann, Dieter Gollmann -- Conditional Correlation Attack On Nonlinear Filter Generators / Sangjin Lee [and Others] --^ The Cryptographic Security Of The Syndrome Decoding Problem For Rank Distance Codes / Florent Chabaud, Jacques Stern -- A World Wide Number Field Sieve Factoring Record / James Cowie [and Others]. Kwangjo Kim, Tsutomu Matsumoto, Eds. Includes Bibliographical References And Index.


📜 SIMILAR VOLUMES