Skip to main content
  • Conference proceedings
  • © 1991

Advances in Cryptology – EUROCRYPT '90

Workshop on the Theory and Application of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 473)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (48 papers)

  1. Front Matter

    Pages I-IX
  2. Protocols

    1. On the Importance of Memory Resources in the Security of Key Exchange Protocols

      • George Davida, Yvo Desmedt, René Peralta
      Pages 11-15
    2. Provably Secure Key-Updating Schemes in Identity-Based Systems

      • S. Shinozaki, T. Itoh, A. Fujioka, S. Tsujii
      Pages 16-30
    3. Oblivious transfer protecting secrecy

      • Bert den Boer
      Pages 31-45
    4. Public-Randomness in Public-Key Cryptography

      • Alfredo De Santis, Giuseppe Persiano
      Pages 46-62
  3. Number-Theoretic Algorithms

    1. Factoring with two large primes

      • Arjen K. Lenstra, Mark S. Manasse
      Pages 72-82
    2. Which new RSA signatures can be computed from some given RSA signatures?

      • Jan-Hendrik Evertse, Eugène van Heyst
      Pages 83-97
    3. Implementation of a Key Exchange Protocol Using Real Quadratic Fields

      • Renate Scheidler, Johannes A. Buchmann, Hugh C. Williams
      Pages 98-109
  4. Boolean Functions

    1. Properties of binary functions

      • Sheelagh Lloyd
      Pages 124-139
    2. Propagation Characteristics of Boolean Functions

      • Bart Preneel, Werner Van Leekwijck, Luc Van Linden, René Govaerts, Joos Vandewalle
      Pages 161-173
  5. Binary Sequences

    1. Lower Bounds for the Linear Complexity of Sequences over Residue Rings

      • Zong-duo Dai, Thomas Beth, Dieter Gollmann
      Pages 189-195
    2. On the Construction of Run Permuted Sequences

      • Cees J. A. Jansen
      Pages 196-203
    3. Correlation Functions of Geometric Sequences

      • Agnes Hui Chan, Mark Goresky, Andrew Klapper
      Pages 214-221

About this book

Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the International Association for Cryptologic Research (IACR). Eurocrypt 90 took place in Åarhus, Denmark, in May 1990. From the 85 papers submitted, 42 were selected for presentation at the conference and for inclusion in this volume. In addition to the formal contributions, short abstracts of a number of informal talks are included in these proceedings. The proceedings are organized into sessions on protocols, number-theoretic algorithms, boolean functions, binary sequences, implementations, combinatorial schemes, cryptanalysis, new cryptosystems, signatures and authentication, and impromptu talks.

Editors and Affiliations

  • Matematisk Institut, Århus Universitet, Århus C, Denmark

    Ivan Bjerre Damgård

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access