rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540416586

Public Key Cryptography

by ;
  • ISBN13:

    9783540416586

  • ISBN10:

    3540416587

  • Format: Paperback
  • Copyright: 2001-02-01
  • Publisher: Springer Verlag
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $84.99 Save up to $65.19
  • Digital
    $42.90*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

The book will present the scientific state-of-the-art in dealing with aqueous systems at high temperature. These conditions are highly relevant to various modern industrial processes (power generation, hydrothermal processing, waste disposal, water purification, mineral exploration, oil recovery, etc). The book will include the most recent advances in physics, chemistry and physical chemistry, and present them in a form that readers can readily apply to traditional and novel applications. The goal of the book will be to provide the scientist/engineer with the tools necessary to interpret plant data and research results, and make technical decisions when different situations arise. It will also cover the needs of scientists seeking information about hydrothermal systems outside their normal area of expertise. The appendix will contain software for calculation of the properties of water and steam as well as the IAPWS releases and guidelines.

Table of Contents

On the Security of a Williams Based Public Key Encryption Schemep. 1
Semantically Secure McEliece Public-Key Cryptosystems - Conversions for McEliece PKCp. 19
IND-CCA Public Key Schemes Equivalent to Factoring n = pqp. 36
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Compositep. 48
On the Security of Lenstra's Variant of DSA without Long Inversionsp. 64
Fast Irreducibility and Subgroup Membership Testing in XTRp. 73
A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemesp. 87
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemesp. 104
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key Systemp. 119
Marking: A Privacy Protecting Approach Against Blackmailingp. 137
Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystemsp. 153
Cryptanalysis of PKP: A New Approachp. 165
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructuresp. 173
Loopholes in Two Public Key Cryptosystems Using the Modular Groupp. 180
Efficient Revocation in Group Signaturesp. 190
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Sharesp. 207
Efficient Asymmetric Self-Enforcement Scheme with Public Traceabilityp. 225
Adaptive Security for the Additive-Sharing Based Proactive RSAp. 240
Robust Forward-Secure Signature Schemes with Proactive Securityp. 264
Equitability in Retroactive Data Confiscation versus Proactive Key Escrowp. 277
A PVSS as Hard as Discrete Log and Shareholder Separabilityp. 287
One Round Threshold Discrete-Log Key Generation without Private Channelsp. 300
Remarks on Mix-Network Based on Permutation Networksp. 317
New Key Recovery in WAKE Protocolp. 325
Redundant Representation of Finite Fieldsp. 339
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptographyp. 353
Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollersp. 365
Secure Server-Aided Signature Generationp. 383
Efficient Long-Term Validation of Digital Signaturesp. 402
A Novel Systolic Architecture for an Efficient RSA Implementationp. 416
Author Indexp. 423
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program