Public Key Cryptography - PKC 2003 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings /

PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research (www.iacr.org). This year the workshop was organized in cooperation with the Department of Computer Science, Florida State...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Desmedt, Yvo (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Έκδοση:1st ed. 2002.
Σειρά:Lecture Notes in Computer Science, 2567
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Diffie-Hellman Based Schemes
  • Efficient Construction of (Distributed) Verifiable Random Functions
  • An Identity-Based Signature from Gap Diffie-Hellman Groups
  • Threshold Cryptography
  • Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
  • An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
  • Reduction Proofs
  • On the Bit Security of NTRUEncrypt
  • Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks
  • Broadcast and Tracing
  • Randomness Re-use in Multi-recipient Encryption Schemeas
  • Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
  • Digital Signatures
  • The Cramer-Shoup Strong-RSA Signature Scheme Revisited
  • Strong Key-Insulated Signature Schemes
  • Specialized Multiparty Cryptography
  • A Verifiable Secret Shuffe of Homomorphic Encryptions
  • Round-Optimal Contributory Conference Key Agreement
  • Cryptanalysis I
  • Security Analysis of the MOR Cryptosystem
  • A Practical Attack on Some Braid Group Based Cryptographic Primitives
  • Elliptic Curves:Implementation Attacks
  • A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
  • Validation of Elliptic Curve Public Keys
  • Exceptional Procedure Attack on Elliptic Curve Cryptosystems
  • Implementation and Hardware Issues
  • On Montgomery-Like Representations for Elliptic Curves over GF(2k)
  • A Dedicated Sieving Hardware
  • A Fast and Secure Implementation of Sflash
  • New Public Key Schemes
  • A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
  • A Lattice Based Public Key Cryptosystem Using Polynomial Representations
  • Elliptic Curves:General Issues
  • The Security of DSA and ECDSA
  • Cryptanalysis II
  • Side-Channel Attacks on Textbook RSA and ElGamal Encryption
  • On the Security of HFE, HFEv- and Quartz
  • Generic Attacks and the Security of Quartz.