|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Yvo DesmedtPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2002 ed. Volume: 2567 Dimensions: Width: 15.50cm , Height: 2.00cm , Length: 23.50cm Weight: 1.200kg ISBN: 9783540003243ISBN 10: 354000324 Pages: 376 Publication Date: 13 December 2002 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of print, replaced by POD ![]() We will order this item for you from a manufatured on demand supplier. Table of ContentsDiffie-Hellman Based Schemes.- Efficient Construction of (Distributed) Verifiable Random Functions.- An Identity-Based Signature from Gap Diffie-Hellman Groups.- Threshold Cryptography.- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme.- An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack.- Reduction Proofs.- On the Bit Security of NTRUEncrypt.- Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks.- Broadcast and Tracing.- Randomness Re-use in Multi-recipient Encryption Schemeas.- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.- Digital Signatures.- The Cramer-Shoup Strong-RSA Signature Scheme Revisited.- Strong Key-Insulated Signature Schemes.- Specialized Multiparty Cryptography.- A Verifiable Secret Shuffe of Homomorphic Encryptions.- Round-Optimal Contributory Conference Key Agreement.- Cryptanalysis I.- Security Analysis of the MOR Cryptosystem.- A Practical Attack on Some Braid Group Based Cryptographic Primitives.- Elliptic Curves:Implementation Attacks.- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems.- Validation of Elliptic Curve Public Keys.- Exceptional Procedure Attack on Elliptic Curve Cryptosystems.- Implementation and Hardware Issues.- On Montgomery-Like Representations for Elliptic Curves over GF(2k).- A Dedicated Sieving Hardware.- A Fast and Secure Implementation of Sflash.- New Public Key Schemes.- A Practical Public Key Cryptosystem from Paillier and Rabin Schemes.- A Lattice Based Public Key Cryptosystem Using Polynomial Representations.- Elliptic Curves:General Issues.- The Security of DSA and ECDSA.- Cryptanalysis II.- Side-Channel Attacks on Textbook RSA and ElGamal Encryption.- On the Security of HFE, HFEv- and Quartz.- Generic Attacks and the Security of Quartz.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |