Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Nguyen, Phong Q. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4341
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Signatures and Lightweight Cryptography
  • Probabilistic Multivariate Cryptography
  • Short 2-Move Undeniable Signatures
  • Searching for Compact Algorithms: cgen
  • Invited Talk
  • On Pairing-Based Cryptosystems
  • Pairing-Based Cryptography
  • A New Signature Scheme Without Random Oracles from Bilinear Pairings
  • Efficient Dynamic k-Times Anonymous Authentication
  • Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?
  • Algorithmic Number Theory
  • Factorization of Square-Free Integers with High Bits Known
  • Scalar Multiplication on Koblitz Curves Using Double Bases
  • Compressed Jacobian Coordinates for OEF
  • Ring Signatures and Group Signatures
  • On the Definition of Anonymity for Ring Signatures
  • Escrowed Linkability of Ring Signatures and Its Applications
  • Dynamic Fully Anonymous Short Group Signatures
  • Hash Functions
  • Formalizing Human Ignorance
  • Discrete Logarithm Variants of VSH
  • How to Construct Sufficient Conditions for Hash Functions
  • Cryptanalysis
  • Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators
  • On the Internal Structure of Alpha-MAC
  • A Weak Key Class of XTEA for a Related-Key Rectangle Attack
  • Key Agreement and Threshold Cryptography
  • Deniable Group Key Agreement
  • An Ideal and Robust Threshold RSA
  • Towards Provably Secure Group Key Agreement Building on Group Theory
  • Public-Key Encryption
  • Universally Composable Identity-Based Encryption
  • Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate
  • Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.