|
![]() |
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the 19th Annual International Cryptology Conference, CRYPTO '99, held in Santa Barbara, California in August 1999. The 38 revised full papers presented were carefully reviewed and selected from a total of 167 submissions. Also included is an invited survey paper. The papers are organized in topical sections on public-key cryptanalysis, secure communication and computation, distributed cryptography, secret-key cryptography, message authentication codes, traitor tracing, differential power analysis, signature schemes, zero knowledge, asymmetric encryption, electronic cash, and protocols and broadcasting. Full Product DetailsAuthor: Michael WienerPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 1999 ed. Volume: 1666 Dimensions: Width: 15.50cm , Height: 3.30cm , Length: 23.50cm Weight: 2.010kg ISBN: 9783540663478ISBN 10: 3540663479 Pages: 648 Publication Date: 28 July 1999 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsPublic-Key Cryptanalysis I.- On the Security of RSA Padding.- Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization.- The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications.- Invited Lecture.- Information-Theoretic Cryptography.- Secure Communication and Computation.- Information Theoretically Secure Communication in the Limited Storage Space Model.- The All-or-Nothing Nature of Two-Party Secure Computation.- Distributed Cryptography.- Adaptive Security for Threshold Cryptosystems.- Two Party RSA Key Generation.- Robust Distributed Multiplication without Interaction.- A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting.- Secret-Key Cryptography.- Truncated Differentials and Skipjack.- Fast Correlation Attacks Based on Turbo Code Techniques.- Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality.- Message Authentication Codes.- UMAC: Fast and Secure Message Authentication.- Square Hash: Fast Message Authentication via Optimized Universal Hash Functions.- Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions.- Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier.- Public-Key Cryptanalysis II.- Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97.- Weakness in Quaternion Signatures.- Cryptanalysis of 2R Schemes.- Factoring N = p r q for Large r.- Traitor Tracing.- An Efficient Public Key Traitor Tracing Scheme.- Dynamic Traitor Tracing.- Efficient Methods for Integrating Traceability and Broadcast Encryption.- Differential Power Analysis.- Differential Power Analysis.- Towards Sound Approaches to Counteract Power-Analysis Attacks.- Signature Schemes.- Separability and Efficiency for Generic Group Signature Schemes.- A Forward-Secure Digital Signature Scheme.- Abuse-Free Optimistic Contract Signing.- Zero Knowledge.- Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK.- On Concurrent Zero-Knowledge with Pre-processing.- Asymmetric Encryption.- On the Security Properties of OAEP as an All-or-Nothing Transform.- Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization.- Secure Integration of Asymmetric and Symmetric Encryption Schemes.- Electronic Cash.- Auditable, Anonymous Electronic Cash.- Protocols and Broadcasting.- Oblivious Transfer with Adaptive Queries.- Compressing Cryptographic Resources.- Coding Constructions for Blacklisting Problems without Computational Assumptions.- An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |