Skip to main content
  • Conference proceedings
  • © 1988

Advances in Cryptology – EUROCRYPT '88

Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988. Proceedings

Conference proceedings info: EUROCRYPT 1988.

Buy it now

Buying options

eBook USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (40 papers)

  1. Front Matter

    Pages I-XI
  2. Key Distribution

    1. Key Agreements Based on Function Composition

      • Rainer A. Rueppel
      Pages 3-10
  3. Authentication

    1. Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts

      • Gustavus J. Simmons, George B. Purdy
      Pages 35-49
    2. Authentication Codes with Multiple Arbiters

      • Ernest F. Brickell, Doug R. Stinson
      Pages 51-55
  4. Signatures

    1. Manipulations and Errors, Detection and Localization

      • Ph. Godlewski, P. Camion
      Pages 97-106
    2. A Generalized Birthday Attack

      • Marc Girault, Robert Cohen, 2)Mireille Campana
      Pages 129-156
  5. Protocols

    1. An Interactive Data Exchange Protocol Based on Discrete Exponentiation

      • G. Agnew, R. Mullin, S. Vanstone
      Pages 159-166
    2. Anonymous and Verifiable Registration in Databases

      • Jørgen Brandt, Ivan Bjerre Damgård, Peter Landrock
      Pages 167-176
    3. Passports and Visas Versus IDs

      • George I. Davida, Yvo G. Desmedt
      Pages 183-188

Other Volumes

  1. Advances in Cryptology — EUROCRYPT ’88

About this book

The International .4ssociation for Cryptologic Research (1.4CR) organizes tmo - ternational conferences every year, one in Europe and one in the 1-nited States. EUROCRYI’T’88. held in the beautiful environment of the S\~isb mountains in Davos, was the sixth European conference. The number of contributions and of participants at the meeting has increased substantiall!.. which is an indication of the high interest in cryptography and system security in general. The interest has not only increased but has also further moved towards - thentication. signatures and other protocols. This is easy to understand in view of the urgent needs for such protocols, in particular in connection with open - formation systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, 2.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems. was however also well represented and several significant results mere communicated. The present proceedings contain all contributions which were accepted for presentation. The chapters correspond to the sessions at the conference.

Editors and Affiliations

  • Asea Brown Boveri, Corporate Research, Baden, Switzerland

    Christoph G. Günther

Bibliographic Information

  • Book Title: Advances in Cryptology – EUROCRYPT '88

  • Book Subtitle: Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988. Proceedings

  • Editors: D. Barstow, W. Brauer, P. Brinch Hansen, D. Gries, D. Luckham, C. Moler, A. Pnueli, G. Seegmüller, J. Stoer, N. Wirth, Christoph G. Günther

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/3-540-45961-8

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Springer Book Archive

  • Copyright Information: Springer-Verlag Berlin Heidelberg 1988

  • eBook ISBN: 978-3-540-45961-3Published: 06 March 2007

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: VI, 383

  • Topics: Cryptology

Buy it now

Buying options

eBook USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access