↓ Skip to main content

Advances in Cryptology — CRYPTO ’94

Overview of attention for book
Cover of 'Advances in Cryptology — CRYPTO ’94'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 The First Experimental Cryptanalysis of the Data Encryption Standard
  3. Altmetric Badge
    Chapter 2 Linear Cryptanalysis of the Fast Data Encipherment Algorithm
  4. Altmetric Badge
    Chapter 3 Differential-Linear Cryptanalysis
  5. Altmetric Badge
    Chapter 4 Linear Cryptanalysis Using Multiple Approximations
  6. Altmetric Badge
    Chapter 5 Hashing with SL 2
  7. Altmetric Badge
    Chapter 6 Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks
  8. Altmetric Badge
    Chapter 7 Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders
  9. Altmetric Badge
    Chapter 8 Designated Confirmer Signatures and Public-Key Encryption are Equivalent
  10. Altmetric Badge
    Chapter 9 Directed Acyclic Graphs, One-way Functions and Digital Signatures
  11. Altmetric Badge
    Chapter 10 An Identity-Based Signature Scheme with Bounded Life-Span
  12. Altmetric Badge
    Chapter 11 More Flexible Exponentiation with Precomputation
  13. Altmetric Badge
    Chapter 12 A Parallel Permutation Multiplier for a PGM Crypto-chip
  14. Altmetric Badge
    Chapter 13 Cryptographic Randomness from Air Turbulence in Disk Drives
  15. Altmetric Badge
    Chapter 14 Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol
  16. Altmetric Badge
    Chapter 15 LFSR-based Hashing and Authentication
  17. Altmetric Badge
    Chapter 16 New Bound on Authentication Code with Arbitration
  18. Altmetric Badge
    Chapter 17 Multi-Secret Sharing Schemes
  19. Altmetric Badge
    Chapter 18 Designing Identification Schemes with Keys of Short Size
  20. Altmetric Badge
    Chapter 19 Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
  21. Altmetric Badge
    Chapter 20 Language Dependent Secure Bit Commitment
  22. Altmetric Badge
    Chapter 21 On the length of cryptographic hash-values used in identification schemes
  23. Altmetric Badge
    Chapter 22 Incremental Cryptography: The Case of Hashing and Signing
  24. Altmetric Badge
    Chapter 23 An Efficient Existentially Unforgeable Signature Scheme and its Applications
  25. Altmetric Badge
    Chapter 24 Bounds for Resilient Functions and Orthogonal Arrays
  26. Altmetric Badge
    Chapter 25 Tracing Traitors
  27. Altmetric Badge
    Chapter 26 Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms
  28. Altmetric Badge
    Chapter 27 Fast Generation of Provable Primes Using Search in Arithmetic Progressions
  29. Altmetric Badge
    Chapter 28 Attack on the Cryptographic Scheme NIKS-TAS
  30. Altmetric Badge
    Chapter 29 On the Risk of Opening Distributed Keys
  31. Altmetric Badge
    Chapter 30 Cryptanalysis of Cryptosystems based on Remote Chaos Replication
  32. Altmetric Badge
    Chapter 31 A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences
  33. Altmetric Badge
    Chapter 32 The Security of Cipher Block Chaining
  34. Altmetric Badge
    Chapter 33 A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem
  35. Altmetric Badge
    Chapter 34 Ciphertext Only Attack for One-way function of the MAP using One Ciphertext
  36. Altmetric Badge
    Chapter 35 Pitfalls in Designing Substitution Boxes
  37. Altmetric Badge
    Chapter 36 A Randomness-Rounds Tradeoff in Private Computation
  38. Altmetric Badge
    Chapter 37 Secure Voting Using Partially Compatible Homomorphisms
  39. Altmetric Badge
    Chapter 38 Maintaining Security in the Presence of Transient Faults
Attention for Chapter 21: On the length of cryptographic hash-values used in identification schemes
Altmetric Badge

Citations

dimensions_citation
13 Dimensions

Readers on

mendeley
38 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
On the length of cryptographic hash-values used in identification schemes
Chapter number 21
Book title
Advances in Cryptology — CRYPTO ’94
Published by
Springer, Berlin, Heidelberg, August 1994
DOI 10.1007/3-540-48658-5_21
Book ISBNs
978-3-54-058333-2, 978-3-54-048658-9
Authors

Marc Girault, Jacques Stern, Girault, Marc, Stern, Jacques

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 38 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 38 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 10 26%
Student > Master 8 21%
Researcher 5 13%
Professor > Associate Professor 3 8%
Professor 2 5%
Other 8 21%
Unknown 2 5%
Readers by discipline Count As %
Computer Science 25 66%
Mathematics 4 11%
Physics and Astronomy 2 5%
Engineering 2 5%
Social Sciences 1 3%
Other 1 3%
Unknown 3 8%