Skip to main content
  • Conference proceedings
  • © 1990

Advances in Cryptology – EUROCRYPT '89

Workshop on the Theory and Application of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 434)

Buy it now

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (72 papers)

  1. Front Matter

    Pages I-X
  2. Public-key cryptosystems

    1. The Adolescence of Public-Key Cryptography

      • Whitfield Diffie
      Pages 2-2
    2. A Secure Public-Key Authentication Scheme

      • Zvi Galil, Stuart Haber, Moti Yung
      Pages 3-15
    3. How to improve signature schemes

      • Gilles Brassard
      Pages 16-22
    4. An Identity-Based Key-Exchange Protocol

      • Christoph G. Günther
      Pages 29-37
    5. How to Keep Authenticity Alive in a Computer Network

      • Fritz Bauspieß, Hans-Joachim Knobloch
      Pages 38-46
    6. The Use of Fractions in Public-Key Cryptosystems

      • Hartmut Isselhorst
      Pages 47-55
  3. Theory

    1. A Key Distribution System Based On Any One-Way Function

      • George Davida, Yvo Desmedt, René Peralta
      Pages 75-79
    2. Non-linearity of Exponent Permutations

      • Josef P. Pieprzyk
      Pages 80-92
    3. 2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms

      • Jean-Jacques Quisquater, Marc Girault
      Pages 102-109
    4. A Simple Technique for Diffusing Cryptoperiods

      • Stig F. Mjølsnes
      Pages 110-120
  4. Zero-knowledge protocols

    1. A General Zero-Knowledge Scheme

      • Mike V. D. Burmester, Fred Piper, Yvo Desmedt, Michael Walker
      Pages 122-133
    2. Practical Zero-Knowledge Proofs: Giving Hints and Using Deficiencies

      • Joan Boyar, Katalin Friedl, Carsten Lund
      Pages 155-172
    3. An alternative to the Fiat-Shamir protocol

      • Jacques Stern
      Pages 173-180

About this book

‘I’he int,ernational Association for Cryptologic Research (IACK) organizes two inter- tioilill coiifcrcnces every year, one in Europe and one in the United States. EUROCRI’PT ’89 was the seventh European conference and was held in Houthalen, Belgium on April 10-13, 1989. With close to 300 participants, it was perhaps the largest open conferencr on c:rypt,ogra.phy ever held. The field of cryptography is expanding not only because of the increased vulnerability of computer systems and networks to a11 increasing range of threats, but also because of t1ic ra.pid progress in cryptographic methods, that t,he readers can witness by reading the book. The present proceedings contain nearly all contributions which were presented including the talks at the rump session. The chapters correspond to the sessions at the conference. It wa5 the first time that a rump session was organized on a Eurocrypt conference. Sixteen impromptu talks were given, and the authors were invited to submit short abstracts of their presentations. Because of the special character of this session, the editors have taken the liberty to shorten some of these.

Editors and Affiliations

  • Philips Research Laboratory, Louvain-la-Neuve, Belgium

    Jean-Jacques Quisquater

  • ESAT Laboratory, Katholieke Universiteit Leuven, Heverlee, Belgium

    Joos Vandewalle

Bibliographic Information

Buy it now

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access