did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540210184

Public Key Cryptography - Pkc 2004: 7th International Workshop on Practice and Theory in Public Key Cryptography, Singapore, March 1-4, 2004 : Proceedings

by ; ;
  • ISBN13:

    9783540210184

  • ISBN10:

    3540210180

  • Format: Paperback
  • Copyright: 2004-03-31
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $129.00

Summary

This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2004, held in Singapore in March 2004. The 32 revised full papers presented were carefully reviewed and selected from 106 submissions. All current issues in public key cryptography are addressed ranging from theoretical and mathematical foundations to a broad variety of public key cryptosystems.

Table of Contents

A Generalized Wiener Attack on RSA
1(13)
Johannes Blomer
Alexander May
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem
14(14)
Jean-Sebastien Coron
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism
28(13)
Roberto Maria Avanzi
Mathieu Ciet
Francesco Sica
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point
41(14)
Pradeep Kumar Mishra
Palash Sarkar
Fast Arithmetic on Jacobians of Picard Curves
55(14)
Stephane Flon
Roger Oyono
Undeniable Signatures Based on Characters: How to Sign with One Bit
69(17)
Jean Monnerat
Serge Vaudenay
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures
86(15)
Ron Steinfeld
Huaxiong Wang
Josef Pieprzyk
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model
101(14)
Huafei Zhu
Constant Round Authenticated Group Key Agreement via Distributed Computation
115(15)
Emmanuel Bresson
Dario Catalano
Efficient ID-based Group Key Agreement with Bilinear Maps
130(15)
Kyu Young Choi
Jung Yeon Hwang
Dong Hoon Lee
New Security Results on Encrypted Key Exchange
145(14)
Emmanuel Bresson
Olivier Chevassut
David Pointcheval
New Results on the Hardness of Diffie-Hellman Bits
159(14)
Maria Isabel Gonzalez Vasco
Mats Naslund
Igor E. Shparlinski
Short Exponent Diffie-Hellman Problems
173(14)
Takeshi Koshiba
Kaoru Kurosawa
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups
187(14)
Benoit Libert
Jean-Jacques Quisquater
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2
201(17)
Nicolas T. Courtois
Secret Exponent Attacks on RSA-type Schemes with Moduli N = prq
218(13)
Alexander May
General Group Authentication Codes and Their Relation to ``Unconditionally-Secure Signatures''
231(17)
Reihaneh Safavi-Naini
Luke McAven
Moti Yung
From Digital Signature to ID-based Identification/Signature
248(14)
Kaoru Kurosawa
Swee-Huay Heng
Identity-Based Threshold Decryption
262(15)
Joonsang Baek
Yuliang Zheng
An Efficient Signature Scheme from Bilinear Pairings and Its Applications
277(14)
Fangguo Zhang
Reihaneh Safavi-Naini
Willy Susilo
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
291(14)
Ryotaro Hayashi
Tatsuaki Okamoto
Keisuke Tanaka
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation
305(14)
Jintai Ding
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability
319(14)
Jun Furukawa
A Point Compression Method for Elliptic Curves Defined over GF(2n)
333(13)
Brian King
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
346(14)
Toru Akishita
Tsuyoshi Takagi
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
360(15)
Rui Zhang
Goichiro Hanaoka
Junji Shikata
Hideki Imai
QuasiModo: Efficient Certificate Validation and Revocation
375(14)
Farid F. Elwailly
Craig Gentry
Zulfikar Ramzan
A Distributed Online Certificate Status Protocol with a Single Public Key
389(13)
Satoshi Koga
Kouichi Sakurai
A First Approach to Provide Anonymity in Attribute Certificates
402(14)
Vicente Benjumea
Javier Lopez
Jose A. Montenegro
Jose M. Troya
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups
416(9)
Igor E. Shparlinski
Arne Winterhof
Cryptographic Randomized Response Techniques
425(14)
Andris Ambainis
Markus Jakobsson
Helger Lipmaa
A Correct, Private, and Efficient Mix Network
439(16)
Kun Peng
Colin Boyd
Ed Dawson
Kapali Viswanathan
Author Index 455

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program