Advances in cryptology - ASIACRYPT 2003 : 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003 : proceedings

書誌事項

Advances in cryptology - ASIACRYPT 2003 : 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003 : proceedings

Chi Sung Laih (ed.)

(Lecture notes in computer science, 2894)

Springer, c2003

この図書・雑誌をさがす
注記

Includes bibliographical references and index

内容説明・目次

内容説明

ASIACRYPT 2003 was held in Taipei, Taiwan, from Nov. 30 to Dec. 4, 2003. The 9th Annual ASIACRYPT conference was sponsored by the International Association for Cryptologic Research (IACR), this year in cooperation with the ChineseCryptologyandInformationSecurityAssociation(CCISA)andNational Cheng Kung University (NCKU) in Taiwan. One hundred and eighty-eight papers from 26 countries were submitted to ASIACRYPT 2003 and 33 (of which one paper was withdrawn by the authors afternoti?cation)ofthesewereselectedforpresentation.Theseproceedingsc- tainrevisedversionsoftheacceptedpapers.WehadanIACR2003Distinguished Lecture, by Dr. Don Coppersmith, entitled "Solving Low Degree Polynomials." In addition, two invited talks were given at the conference. One was given by Dr. Adi Shamir. The other one was given by Dr. Hong-Sen Yan, entitled "The Secret and Beauty of Ancient Chinese Locks." The conference program also included a rump session, chaired by Tzong Chen Wu, which featured short informal talks on recent results. It was a pleasure for me to work with the program committee, which was composed of 27 members from 17 countries; I thank them for working very hard overseveralmonths.Asamatteroffact,thereviewprocesswasachallengingand time-consuming task, and it lasted about 8 weeks, followed by more than half a month for discussions among the program committee members. All submissions were anonymously reviewed by at least 3 members in the relevant areas of the program committee; in some cases, particularly for those papers submitted by a member of the program committee, they were reviewed by at least six members. We are grateful to all the program committee members who put in a lot of e?ort andprecioustimegivingtheirexpertanalysisandcommentsonthesubmissions.

目次

Public Key Cryptography I.- Chosen-Ciphertext Security without Redundancy.- Some RSA-Based Encryption Schemes with Tight Security Reduction.- A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications.- Number Theory I.- Factoring Estimates for a 1024-Bit RSA Modulus.- Index Calculus Attack for Hyperelliptic Curves of Small Genus.- Efficient Implementations.- Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves.- Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p - x + d.- The AGM-X 0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting.- Key Management and Protocols.- Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy.- Leakage-Resilient Authenticated Key Establishment Protocols.- Untraceable Fair Network Payment Protocols with Off-Line TTP.- Hash Functions.- Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking.- New Parallel Domain Extenders for UOWHF.- Cryptanalysis of 3-Pass HAVAL.- Group Signatures.- Efficient Group Signatures without Trapdoors.- Accumulating Composites and Improved Group Signing.- Almost Uniform Density of Power Residues and the Provable Security of ESIGN.- Number Theory II.- Rotations and Translations of Number Field Sieve Polynomials.- On Class Group Computations Using the Number Field Sieve.- Invited Talk.- The Secret and Beauty of Ancient Chinese Padlocks.- Block Ciphers.- A Traceable Block Cipher.- A New Attack against Khazad.- Broadcast and Multicast.- An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.- Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.- Foundations and Complexity Theory.- Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption.- On Diophantine Complexity and Statistical Zero-Knowledge Arguments.- Verifiable Homomorphic Oblivious Transfer and Private Equality Test.- Public Key Cryptography II.- Generalized Powering Functions and Their Application to Digital Signatures.- Certificateless Public Key Cryptography.- A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.- The Insecurity of Esign in Practical Implementations.- Digital Signature.- Efficient One-Time Proxy Signatures.- Universal Designated-Verifier Signatures.

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示
詳細情報
ページトップへ