Public Key Cryptography -- PKC 2003 : 6th International Workshop on Practice and Theory in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003 : proceedings
Author(s)
Bibliographic Information
Public Key Cryptography -- PKC 2003 : 6th International Workshop on Practice and Theory in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003 : proceedings
(Lecture notes in computer science, 2567)
Springer, c2002
Available at / 42 libraries
-
Library, Research Institute for Mathematical Sciences, Kyoto University数研
L/N||LNCS||256702083788
-
INTERNATIONAL CHRISTIAN UNIVERSITY LIBRARY図
V.2567007.6/L507/v.256705931762,
007.6/L507/v.256705931762 -
University of Tsukuba Library, Library on Library and Information Science
007.08-L49-256710002309650
-
No Libraries matched.
- Remove all filters.
Note
Includes bibliographical references and index
Description and Table of Contents
Description
This book constitutes the refereed proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2003, held in Miami, Florida, USA in January 2003.
The 26 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on Diffie-Hellman based schemes, threshold cryptography, reduction proofs, broadcast and tracing, digital signatures, specialized multiparty cryptography, cryptanalysis, elliptic curves: implementation attacks, implementation and hardware issues, new public key schemes, and elliptic curves: general issues.
Table of Contents
Diffie-Hellman Based Schemes.- Efficient Construction of (Distributed) Verifiable Random Functions.- An Identity-Based Signature from Gap Diffie-Hellman Groups.- Threshold Cryptography.- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme.- An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack.- Reduction Proofs.- On the Bit Security of NTRUEncrypt.- Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks.- Broadcast and Tracing.- Randomness Re-use in Multi-recipient Encryption Schemeas.- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.- Digital Signatures.- The Cramer-Shoup Strong-RSA Signature Scheme Revisited.- Strong Key-Insulated Signature Schemes.- Specialized Multiparty Cryptography.- A Verifiable Secret Shuffe of Homomorphic Encryptions.- Round-Optimal Contributory Conference Key Agreement.- Cryptanalysis I.- Security Analysis of the MOR Cryptosystem.- A Practical Attack on Some Braid Group Based Cryptographic Primitives.- Elliptic Curves:Implementation Attacks.- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems.- Validation of Elliptic Curve Public Keys.- Exceptional Procedure Attack on Elliptic Curve Cryptosystems.- Implementation and Hardware Issues.- On Montgomery-Like Representations for Elliptic Curves over GF(2k).- A Dedicated Sieving Hardware.- A Fast and Secure Implementation of Sflash.- New Public Key Schemes.- A Practical Public Key Cryptosystem from Paillier and Rabin Schemes.- A Lattice Based Public Key Cryptosystem Using Polynomial Representations.- Elliptic Curves:General Issues.- The Security of DSA and ECDSA.- Cryptanalysis II.- Side-Channel Attacks on Textbook RSA and ElGamal Encryption.- On the Security of HFE, HFEv- and Quartz.- Generic Attacks and the Security of Quartz.
by "Nielsen BookData"