Public Key Cryptography Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999, Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Imai, Hideki (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Zheng, Yuliang (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1999.
Έκδοση:1st ed. 1999.
Σειρά:Lecture Notes in Computer Science, 1560
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation
  • A New Aspect of Dual Basis for Efficient Field Arithmetic
  • On the Security of Random Sources
  • Anonymous Fingerprinting Based on Committed Oblivious Transfer
  • How to Enhance the Security of Public-Key Encryption at Minimum Cost
  • Encrypted Message Authentication by Firewalls
  • A Relationship between One-Wayness and Correlation Intractability
  • Message Recovery Fair Blind Signature
  • On Quorum Controlled Asymmetric Proxy Re-encryption
  • Mini-Cash: A Minimalistic Approach to E-Commerce
  • Preserving Privacy in Distributed Delegation with Fast Certificates
  • Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
  • Toward Fair International Key Escrow
  • How to Copyright a Function?
  • On the Security of RSA Screening
  • The Effectiveness of Lattice Attacks Against Low-Exponent RSA
  • A Trapdoor Permutation Equivalent to Factoring
  • Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
  • Evaluating Differential Fault Analysis of Unknown Cryptosystems
  • Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project
  • Hash Functions and the MAC Using All-or-Nothing Property
  • Decision Oracles are Equivalent to Matching Oracles
  • Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret
  • Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy
  • A Secure Pay-per-View Scheme for Web-Based Video Service.