New attacks on RSA with small secret CRT-exponents | p. 1 |
An attack on a modified Niederreiter encryption scheme | p. 14 |
Cryptanalysis of an efficient proof of knowledge of discrete logarithm | p. 27 |
Efficient polynomial operations in the shared-coefficients setting | p. 44 |
Generic on-line/off-line threshold signatures | p. 58 |
Linear integer secret sharing and distributed exponentiation | p. 75 |
Encoding-free ElGamal encryption without random oracles | p. 91 |
Parallel key-insulated public key encryption | p. 105 |
Provably secure steganography with imperfect sampling | p. 123 |
Collision-resistant no more : hash-and-sign paradigm revisited | p. 140 |
Higher order universal one-way hash functions from the subset sum assumption | p. 157 |
An algorithm to solve the discrete logarithm problem with cite number field sieve | p. 174 |
Efficient scalar multiplication by isogeny decompositions | p. 191 |
Curve25519 : new Diffie-Hellman speed records | p. 207 |
Strongly unforgeable signatures based on computational Diffie-Hellman | p. 229 |
Generalization of the selective-ID security model for HIBE protocols | p. 241 |
Identity-based aggregate signatures | p. 257 |
On the limitations of the spread of an IBE-to-PKE transformation | p. 274 |
Inoculating multivariate schemes against differential attacks | p. 290 |
Random subgroups of braid groups : an approach to cryptanalysis of a braid group based cryptographic protocol | p. 302 |
High-order attacks against the exponent splitting protection | p. 315 |
New online/offline signature schemes without random oracles | p. 330 |
Anonymous signature schemes | p. 347 |
The power of identification schemes | p. 364 |
Security analysis of KEA authenticated key exchange protocol | p. 378 |
SAS-based authenticated key agreement | p. 395 |
The twist-AUgmented technique for key exchange | p. 410 |
Password-based group key exchange in a constant number of rounds | p. 427 |
Conditional oblivious cast | p. 443 |
Efficiency tradeoffs for malicious two-party computation | p. 458 |
On constructing certificateless cryptosystems from identity based encryption | p. 474 |
Building better signcryption schemes with tag-KEMs | p. 491 |
Security-mediated certificateless cryptography | p. 508 |
k-Times anonymous authentication with a constant proving cost | p. 525 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.