Cart
  • Free Shipping on all orders in Australia
  • Over 7 million books in stock
  • Proud to be B-Corp
  • We aim to be carbon neutral by 2022
  • Over 120,000 Trustpilot reviews
Item 1 of 0
Public Key Cryptography - PKC 2003 By Yvo Desmedt

Public Key Cryptography - PKC 2003 by Yvo Desmedt

Condition - New
$156.39
Only 2 left

Summary

This book constitutes the refereed proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2003, held in Miami, Florida, USA in January 2003.

The 26 revised full papers presented were carefully reviewed and selected from 105 submissions.

Public Key Cryptography - PKC 2003 Summary

Public Key Cryptography - PKC 2003: 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings by Yvo Desmedt

This book constitutes the refereed proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2003, held in Miami, Florida, USA in January 2003.

The 26 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on Diffie-Hellman based schemes, threshold cryptography, reduction proofs, broadcast and tracing, digital signatures, specialized multiparty cryptography, cryptanalysis, elliptic curves: implementation attacks, implementation and hardware issues, new public key schemes, and elliptic curves: general issues.

Table of Contents

Diffie-Hellman Based Schemes.- Efficient Construction of (Distributed) Verifiable Random Functions.- An Identity-Based Signature from Gap Diffie-Hellman Groups.- Threshold Cryptography.- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme.- An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack.- Reduction Proofs.- On the Bit Security of NTRUEncrypt.- Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks.- Broadcast and Tracing.- Randomness Re-use in Multi-recipient Encryption Schemeas.- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.- Digital Signatures.- The Cramer-Shoup Strong-RSA Signature Scheme Revisited.- Strong Key-Insulated Signature Schemes.- Specialized Multiparty Cryptography.- A Verifiable Secret Shuffe of Homomorphic Encryptions.- Round-Optimal Contributory Conference Key Agreement.- Cryptanalysis I.- Security Analysis of the MOR Cryptosystem.- A Practical Attack on Some Braid Group Based Cryptographic Primitives.- Elliptic Curves:Implementation Attacks.- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems.- Validation of Elliptic Curve Public Keys.- Exceptional Procedure Attack on Elliptic Curve Cryptosystems.- Implementation and Hardware Issues.- On Montgomery-Like Representations for Elliptic Curves over GF(2k).- A Dedicated Sieving Hardware.- A Fast and Secure Implementation of Sflash.- New Public Key Schemes.- A Practical Public Key Cryptosystem from Paillier and Rabin Schemes.- A Lattice Based Public Key Cryptosystem Using Polynomial Representations.- Elliptic Curves:General Issues.- The Security of DSA and ECDSA.- Cryptanalysis II.- Side-Channel Attacks on Textbook RSA and ElGamal Encryption.- On the Security of HFE, HFEv- and Quartz.- Generic Attacks and the Security of Quartz.

Additional information

NLS9783540003243
9783540003243
354000324X
Public Key Cryptography - PKC 2003: 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings by Yvo Desmedt
New
Paperback
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
2002-12-13
376
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a new book - be the first to read this copy. With untouched pages and a perfect binding, your brand new copy is ready to be opened for the first time

Customer Reviews - Public Key Cryptography - PKC 2003