rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540338512

Public Key Cryptography-PKC 2006

by ; ; ;
  • ISBN13:

    9783540338512

  • ISBN10:

    3540338519

  • Format: Paperback
  • Copyright: 2006-05-15
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $99.99

Summary

This book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2006, held in New York, NY, USA in April 2006.The 34 revised full papers presented were carefully reviewed and selected from 124 submissions. The papers are organized in topical sections on cryptanalysis and protocol weaknesses, distributed crypto-computing, encryption methods, cryptographic hash and applications, number theory algorithms, pairing-based cryptography, cryptosystems design and analysis, signature and identification, authentication and key establishment, multi-party computation, and PKI techniques.

Table of Contents

New attacks on RSA with small secret CRT-exponentsp. 1
An attack on a modified Niederreiter encryption schemep. 14
Cryptanalysis of an efficient proof of knowledge of discrete logarithmp. 27
Efficient polynomial operations in the shared-coefficients settingp. 44
Generic on-line/off-line threshold signaturesp. 58
Linear integer secret sharing and distributed exponentiationp. 75
Encoding-free ElGamal encryption without random oraclesp. 91
Parallel key-insulated public key encryptionp. 105
Provably secure steganography with imperfect samplingp. 123
Collision-resistant no more : hash-and-sign paradigm revisitedp. 140
Higher order universal one-way hash functions from the subset sum assumptionp. 157
An algorithm to solve the discrete logarithm problem with cite number field sievep. 174
Efficient scalar multiplication by isogeny decompositionsp. 191
Curve25519 : new Diffie-Hellman speed recordsp. 207
Strongly unforgeable signatures based on computational Diffie-Hellmanp. 229
Generalization of the selective-ID security model for HIBE protocolsp. 241
Identity-based aggregate signaturesp. 257
On the limitations of the spread of an IBE-to-PKE transformationp. 274
Inoculating multivariate schemes against differential attacksp. 290
Random subgroups of braid groups : an approach to cryptanalysis of a braid group based cryptographic protocolp. 302
High-order attacks against the exponent splitting protectionp. 315
New online/offline signature schemes without random oraclesp. 330
Anonymous signature schemesp. 347
The power of identification schemesp. 364
Security analysis of KEA authenticated key exchange protocolp. 378
SAS-based authenticated key agreementp. 395
The twist-AUgmented technique for key exchangep. 410
Password-based group key exchange in a constant number of roundsp. 427
Conditional oblivious castp. 443
Efficiency tradeoffs for malicious two-party computationp. 458
On constructing certificateless cryptosystems from identity based encryptionp. 474
Building better signcryption schemes with tag-KEMsp. 491
Security-mediated certificateless cryptographyp. 508
k-Times anonymous authentication with a constant proving costp. 525
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program