E-Book, Englisch, Band 1992, 428 Seiten, eBook
Kim Public Key Cryptography
Erscheinungsjahr 2003
ISBN: 978-3-540-44586-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001. Proceedings
E-Book, Englisch, Band 1992, 428 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-44586-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
On the Security o a Williams Based Public Key Encryption Scheme.- Semantically Secure McEliece Public-Key Cryptosystems -Conversions for McEliece PKC -.- IND-CCA Public Key Schemes Equivalent to Factoring n =pq.- Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite.- On the Security o Lenstra’ s Variant o DSA without Long Inversions.- Fast Irreducibility and Subgroup Membership Testing in XTR.- A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes.- The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes.- A Generalisation, a Simpli.cation and Some Applications of Paillier's Probabilistic Public-Key System.- Marking: A Privacy Protecting Approach Against Blackmailing.- Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems.- Cryptanalysis of PKP: A New Approach.- Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.- Loopholes in Two Public Key Cryptosystems Using the Modular Group.- Efficient Revocation in Group Signatures.- A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares.- Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.- Adaptive Security for the Additive-Sharing Based Proactive RSA.- Robust Forward-Secure Signature Schemes with Proactive Security.- Equitability in Retroactive Data Confiscation versus Proactive Key Escrow.- A PVSS as Hard as Discrete Log and Shareholder Separability.- One Round Threshold Discrete-Log Key Generation without Private Channels.- Remarks on Mix-Network Based on Permutation Networks.- New Key Recovery in WAKE Protocol.- Redundant Representation of Finite Fields.- Compact Encoding of Non-adjacent Forms with Applications to Elliptic CurveCryptography.- Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP430x33x Family of Microcontrollers.- Secure Server-Aided Signature Generation.- Efficient Long-Term Validation of Digital Signatures.- A Novel Systolic Architecture for an Efficient RSA Implementation.