Public Key Cryptography - PKC 2003 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings /
PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research (www.iacr.org). This year the workshop was organized in cooperation with the Department of Computer Science, Florida State...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2002.
|
Edition: | 1st ed. 2002. |
Series: | Lecture Notes in Computer Science,
2567 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Diffie-Hellman Based Schemes
- Efficient Construction of (Distributed) Verifiable Random Functions
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Threshold Cryptography
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
- Reduction Proofs
- On the Bit Security of NTRUEncrypt
- Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks
- Broadcast and Tracing
- Randomness Re-use in Multi-recipient Encryption Schemeas
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Digital Signatures
- The Cramer-Shoup Strong-RSA Signature Scheme Revisited
- Strong Key-Insulated Signature Schemes
- Specialized Multiparty Cryptography
- A Verifiable Secret Shuffe of Homomorphic Encryptions
- Round-Optimal Contributory Conference Key Agreement
- Cryptanalysis I
- Security Analysis of the MOR Cryptosystem
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
- Elliptic Curves:Implementation Attacks
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
- Validation of Elliptic Curve Public Keys
- Exceptional Procedure Attack on Elliptic Curve Cryptosystems
- Implementation and Hardware Issues
- On Montgomery-Like Representations for Elliptic Curves over GF(2k)
- A Dedicated Sieving Hardware
- A Fast and Secure Implementation of Sflash
- New Public Key Schemes
- A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
- A Lattice Based Public Key Cryptosystem Using Polynomial Representations
- Elliptic Curves:General Issues
- The Security of DSA and ECDSA
- Cryptanalysis II
- Side-Channel Attacks on Textbook RSA and ElGamal Encryption
- On the Security of HFE, HFEv- and Quartz
- Generic Attacks and the Security of Quartz.