EUROCRYPT 1991: Brighton, UK
- Donald W. Davies:
Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings. Lecture Notes in Computer Science 547, Springer 1991, ISBN 3-540-54620-0
Cryptanalysis I
Cryptanalysis II
- Matthijs J. Coster, Brian A. LaMacchia, Andrew M. Odlyzko:
An Improved Low-Denisty Subset Sum Algorithm. 54-67
Zero Knowledge and Oblivious Transfer
- Tatsuaki Okamoto, David Chaum, Kazuo Ohta:
Direct Zero Knowledge Proofs of Computational Power in Five Rounds. 96-105
Sequences I
- Sibylle Mund:
Liv-Lempel Complexity for Periodic Sequences and its Cryptographic Application. 114-126 - Toshiki Habutsu, Yoshifumi Nishio, Iwao Sasase, Shinsaku Mori:
A Secret Key Cryptosystem by Iterating a Chaotic Map. 127-140 - Bart Preneel, René Govaerts, Joos Vandewalle:
Boolean Functions Satisfying Higher Order Propagation Criteria. 141-152
Sequences II
Sequences III
- Vladimir V. Chepyzhov, Ben J. M. Smeets:
On A Fast Correlation Attack on Certain Stream Ciphers. 176-185 - Willi Meier, Othmar Staffelbach:
Analysis of Pseudo Random Sequence Generated by Cellular Automata. 186-199 - William G. Chambers, Zong-Duo Dai:
On Binary Sequences from Recursions modulo 2e Made Non-Linear by the Bit-by-Bit XOR Function. 200-204
Signatures
- Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta:
Interactive Bi-Proof Systems and Undeniable Signature Schemes. 243-256
Theory I
- Claus-Peter Schnorr:
Factoring Integers and Computing Discrete Logarithms via Diophantine Approximations. 281-293
Theory II
- Hiroki Shizuya, Toshiya Itoh, Kouichi Sakurai:
On the Complexity of Hyperelliptic Discrete Logarithm Problem. 337-351
S-Box Criteria
- M. H. Dawson, Stafford E. Tavares:
An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks. 352-367
Applications I
- Bruce Goldburg, Ed Dawson, S. Sridharan:
The Automated Cryptanalysis of Analog Speech Scramblers. 422-430
Applications II
- Babak Sadeghiyan, Josef Pieprzyk:
A Construction for One Way Hash Functions and Pseudorandom Bit Generators. 431-445 - Atsushi Fujioka, Tatsuaki Okamoto, Shoji Miyaguchi:
ESIGN: An Efficient Digital Signature Implementation for Smard Cards. 446-457
Public Key Cryptography
- Ernst M. Gabidulin, A. V. Paramonov, O. V. Tretjakov:
Ideals over a Non-Commutative Ring and thier Applications in Cryptology. 482-489
Short Papers Presented at the "Rump Session"
- Miodrag J. Mihaljevic, Jovan Dj. Golic:
A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction. 527-531 - Bart Preneel, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen:
Race Integrity Primitives Evaluation (RIPE): A Status Report. 547-551