Skip to main content
  • Conference proceedings
  • © 1998

Advances in Cryptology — ASIACRYPT’98

International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18–22, 1998, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1514)

Conference series link(s): AUSCRYPT: International Conference on Cryptology

Conference proceedings info: ASIACRYPT 1998.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

    Pages I-XII
  2. Public Key Cryptosystems

    1. Generation of Shared RSA Keys by Two Parties

      • Guillaume Poupard, Jacques Stern
      Pages 11-24
    2. An Attack on RSA Given a Small Fraction of the Private Key Bits

      • Dan Boneh, Glenn Durfee, Yair Frankel
      Pages 25-34
    3. C *−+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai

      • Jacques Patarin, Louis Goubin, Nicolas Courtois
      Pages 35-50
  3. Elliptic Curve Cryptosystems

    1. Efficient Elliptic Curve Exponentiation Using Mixed Coordinates

      • Henri Cohen, Atsuko Miyaji, Takatoshi Ono
      Pages 51-65
    2. Efficient Implementation of Schoof’s Algorithm

      • Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
      Pages 66-79
    3. Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings

      • Jinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii
      Pages 95-109
    4. Elliptic Curve Discrete Logarithms and the Index Calculus

      • Joseph H. Silverman, Joe Suzuki
      Pages 110-125
  4. Cryptanalysis 1

    1. Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers

      • Hongjun Wu, Feng Bao, Robert H. Deng, Qin -Zhong Ye
      Pages 126-132
    2. Improved Truncated Differential Attacks on SAFER

      • Hongjun Wu, Feng Bao, Robert H. Deng, Qin -Zhong Ye
      Pages 133-147
  5. Signature

    1. A Group Signature Scheme with Improved Efficiency (Extended Abstract)

      • Jan Camenisch, Markus Michels
      Pages 160-174
    2. A Study on the Proposed Korean Digital Signature Algorithm

      • Chae Hoon Lim, Pil Joong Lee
      Pages 175-186
  6. Cryptanlysis 2

    1. Cryptanalysis of the Original McEliece Cryptosystem

      • Anne Canteaut, Nicolas Sendrier
      Pages 187-199
    2. Cryptanalysis in Prime Order Subgroups of Z n *

      • Wenbo Mao, Chae Hoon Lim
      Pages 214-226
  7. Finite Automata

    1. Weak Invertibility of Finite Automata and Cryptanalysis on FAPKC

      • Zong Duo Dai, Ding Feng Ye, Kwok Yan Lam
      Pages 227-241

About this book

ASIACRYPT’98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22. This is the fourth of the Asiacrypt conferences. ASIACRYPT’98 is sponsored by the State Key Laboratory of Information Security (SKLOIS), University of Science and Technology of China (USTC), and the Asiacrypt Steering Committee (ASC), in cooperation with the International Association for Cryptology Research (IACR). The 16-member Program Committee organized the scientific program and considered 118 submissions. Of these, 32 were accepted for presentation. The authors’ affiliations of the 118 submissions and the 32 accepted papers range over 18 and 13 countries or regions, respectively. The submitted version of each paper was sent to all members of the Program Committee and was extensively examined by at least three committee members and/or outside experts. The review process was rigorously blinded and the anonymity of each submission are maintained until the selection was completed. We followed the traditional policy that each member of the Program Committee could be an author of at most one accepted paper. These proceedings contain the revised versions of the 32 contributed talks as well as a short note written by one invited speaker. Comments from the Program Committee were taken into account in the revisions. However, the authors (not the committee) bear full responsibility for the contents of their papers.

Editors and Affiliations

  • NTT Information and Communication System Labs., Kanagawa, Japan

    Kazuo Ohta

  • Graduate School of USTC, SKLOIS, Beijing, P.R. China

    Dingyi Pei

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access