Public key cryptography -- PKC 2008 : 11th International Workshop on Practice and Theory in Public Key Cryptography, Barcelona, Spain, March 9-12, 2008 : proceedings
著者
書誌事項
Public key cryptography -- PKC 2008 : 11th International Workshop on Practice and Theory in Public Key Cryptography, Barcelona, Spain, March 9-12, 2008 : proceedings
(Lecture notes in computer science, 4939)
Springer, c2008
大学図書館所蔵 件 / 全11件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Includes bibliographical references and index
"LNCS Sublibrary : SL 4 Security and cryptology"--T.p. verso
内容説明・目次
内容説明
This book contains the proceedings of the 11th International Workshop on Practice and Theory in Public-Key Cryptography. Coverage includes algebraic and number theoretical cryptoanalysis, theory of public key encryption, and public key encryption.
目次
Session I: Algebraic and Number Theoretical Cryptanalysis (I).- Total Break of the ?-IC Signature Scheme.- Recovering NTRU Secret Key from Inversion Oracles.- Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?.- Session II: Theory of Public Key Encryption.- Relations Among Notions of Plaintext Awareness.- Completely Non-malleable Encryption Revisited.- Invited Talk I.- Cryptographic Test Correction.- Session III: Digital Signatures (I).- Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results.- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures.- Proxy Signatures Secure Against Proxy Key Exposure.- Session IV: Identification, Broadcast and Key Agreement.- Lattice-Based Identification Schemes Secure Under Active Attacks.- Efficient Simultaneous Broadcast.- SAS-Based Group Authentication and Key Agreement Protocols.- Session V: Implementation of Fast Arithmetic.- An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm.- New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields.- Session VI: Digital Signatures (II).- Online-Untransferable Signatures.- Security of Digital Signature Schemes in Weakened Random Oracle Models.- A Digital Signature Scheme Based on CVP ???.- Session VII: Algebraic and Number Theoretical Cryptanalysis (II).- An Analysis of the Vector Decomposition Problem.- A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents.- Session VIII: Public Key Encryption.- Certificateless Encryption Schemes Strongly Secure in the Standard Model.- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption.- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time.
「Nielsen BookData」 より