Public Key Cryptography - PKC 2003: 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings

Author:   Yvo Desmedt
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2002 ed.
Volume:   2567
ISBN:  

9783540003243


Pages:   376
Publication Date:   13 December 2002
Format:   Paperback
Availability:   Out of print, replaced by POD   Availability explained
We will order this item for you from a manufatured on demand supplier.

Our Price $189.95 Quantity:  
Add to Cart

Share |

Public Key Cryptography - PKC 2003: 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Yvo Desmedt
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2002 ed.
Volume:   2567
Dimensions:   Width: 15.50cm , Height: 2.00cm , Length: 23.50cm
Weight:   1.200kg
ISBN:  

9783540003243


ISBN 10:   354000324
Pages:   376
Publication Date:   13 December 2002
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of print, replaced by POD   Availability explained
We will order this item for you from a manufatured on demand supplier.

Table of Contents

Diffie-Hellman Based Schemes.- Efficient Construction of (Distributed) Verifiable Random Functions.- An Identity-Based Signature from Gap Diffie-Hellman Groups.- Threshold Cryptography.- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme.- An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack.- Reduction Proofs.- On the Bit Security of NTRUEncrypt.- Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks.- Broadcast and Tracing.- Randomness Re-use in Multi-recipient Encryption Schemeas.- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.- Digital Signatures.- The Cramer-Shoup Strong-RSA Signature Scheme Revisited.- Strong Key-Insulated Signature Schemes.- Specialized Multiparty Cryptography.- A Verifiable Secret Shuffe of Homomorphic Encryptions.- Round-Optimal Contributory Conference Key Agreement.- Cryptanalysis I.- Security Analysis of the MOR Cryptosystem.- A Practical Attack on Some Braid Group Based Cryptographic Primitives.- Elliptic Curves:Implementation Attacks.- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems.- Validation of Elliptic Curve Public Keys.- Exceptional Procedure Attack on Elliptic Curve Cryptosystems.- Implementation and Hardware Issues.- On Montgomery-Like Representations for Elliptic Curves over GF(2k).- A Dedicated Sieving Hardware.- A Fast and Secure Implementation of Sflash.- New Public Key Schemes.- A Practical Public Key Cryptosystem from Paillier and Rabin Schemes.- A Lattice Based Public Key Cryptosystem Using Polynomial Representations.- Elliptic Curves:General Issues.- The Security of DSA and ECDSA.- Cryptanalysis II.- Side-Channel Attacks on Textbook RSA and ElGamal Encryption.- On the Security of HFE, HFEv- and Quartz.- Generic Attacks and the Security of Quartz.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List