Skip to main content
  • Conference proceedings
  • © 1995

Advances in Cryptology - ASIACRYPT '94

4th International Conference on the Theory and Application of Cryptology, Wollongong, Australia, November 28 - December 1, 1994. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 917)

Conference series link(s): AUSCRYPT: International Conference on Cryptology

Conference proceedings info: ASIACRYPT 1994.

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

  2. Multiplicative non-abelian sharing schemes and their application to threshold cryptography

    • Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester
    Pages 19-32
  3. On sharing many secrets

    • Wen -Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Pages 42-54
  4. Combinatorial interpretation of secret sharing schemes

    • Kaoru Kurosawa, Koji Okada
    Pages 55-64
  5. On the linear complexity of nonlinearly filtered PN-sequences

    • Amparo Fúster-Sabater, Pino Caballero-Gil
    Pages 80-90
  6. Semi-bent functions

    • Seongtaek Chee, Sangjin Lee, Kwangjo Kim
    Pages 105-118
  7. Structures of cryptographic functions with strong avalanche characteristics

    • Jennifer Seberry, Xian -Mo Zhang, Yuliang Zheng
    Pages 119-132
  8. Formal verification of cryptographic protocols: A survey

    • Catherine A. Meadows, Catherine A. Meadows
    Pages 133-150
  9. Efficient electronic money

    • Yacov Yacobi
    Pages 151-163
  10. How to prevent buying of votes in computer elections

    • Valtteri Niemi, Ari Renvall
    Pages 164-170
  11. Zero-knowledge proofs of computational power in the shared string model

    • Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano
    Pages 182-192
  12. Combinatorial structure of A-codes with r-fold security

    • R. Safavi-Naini, L. Tombak
    Pages 209-223
  13. A digital signature scheme based on linear error-correcting block codes

    • Mohssen Alabbadi, Stephen B. Wicker
    Pages 238-248

About this book

This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994.
Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms.

Bibliographic Information

  • Book Title: Advances in Cryptology - ASIACRYPT '94

  • Book Subtitle: 4th International Conference on the Theory and Application of Cryptology, Wollongong, Australia, November 28 - December 1, 1994. Proceedings

  • Editors: Josef Pieprzyk, Reihanah Safavi-Naini

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/BFb0000419

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Springer Book Archive

  • Copyright Information: Springer-Verlag Berlin Heidelberg 1995

  • eBook ISBN: 978-3-540-49236-8Published: 07 October 2005

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XII, 431

  • Topics: Cryptology, Coding and Information Theory, Combinatorics, Computer Communication Networks