05496nam 22008175 450 991014389000332120200705214612.03-540-36563-X10.1007/3-540-36563-X(CKB)1000000000211943(SSID)ssj0000327293(PQKBManifestationID)11230851(PQKBTitleCode)TC0000327293(PQKBWorkID)10301416(PQKB)10373639(DE-He213)978-3-540-36563-1(MiAaPQ)EBC3072019(PPN)155221973(EXLCZ)99100000000021194320121227d2003 u| 0engurnn|008mamaatxtccrTopics in Cryptology -- CT-RSA 2003[electronic resource] The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA April 13-17, 2003, Proceedings /edited by Marc Joye1st ed. 2003.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2003.1 online resource (XII, 424 p.) Lecture Notes in Computer Science,0302-9743 ;2612Bibliographic Level Mode of Issuance: Monograph3-540-00847-0 Includes bibliographical references and index.Key Self-protection -- Forward-Security in Private-Key Cryptography -- Intrusion-Resilient Public-Key Encryption -- Message Authentication -- TMAC: Two-Key CBC MAC -- Montgomery Prime Hashing for Message Authentication -- Digital Signatures -- An Analysis of Proxy Signatures: Is a Secure Channel Necessary? -- Invisibility and Anonymity of Undeniable and Confirmer Signatures -- Pairing Based Cryptography -- A Secure Signature Scheme from Bilinear Maps -- Access Control Using Pairing Based Cryptography -- Multivariate and Lattice Problems -- NTRUSign: Digital Signatures Using the NTRU Lattice -- About the XL Algorithm over GF(2) -- Cryptographic Architectures -- Efficient GF(p m ) Arithmetic Architectures for Cryptographic Applications -- Hardware Performance Characterization of Block Cipher Structures -- New RSA-based Cryptosystems -- Simple Identity-Based Cryptography with Mediated RSA -- Two Birds One Stone: Signcryption Using RSA -- Invited Talk I -- Cryptography after the Bubble: How to Make an Impact on the World -- Chosen-Ciphertext Security -- Rethinking Chosen-Ciphertext Security under Kerckhoffs’ Assumption -- Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes -- Broadcast Encryption and PRF Sharing -- Fault Tolerant and Distributed Broadcast Encryption -- Shared Generation of Pseudo-Random Functions with Cumulative Maps -- Authentication Structures -- Authenticated Data Structures for Graph and Geometric Searching -- Fractal Merkle Tree Representation and Traversal -- Invited Talk II -- RSA Shortcuts -- Elliptic Curves and Pairings -- The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks -- Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation -- Threshold Cryptography -- Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures -- Secure Applications of Pedersen’s Distributed Key Generation Protocol -- Implementation Issues -- Seeing through Mist Given a Small Fraction of an RSA Private Key -- Simple Backdoors for RSA Key Generation.Lecture Notes in Computer Science,0302-9743 ;2612Data encryption (Computer science)Computer communication systemsOperating systems (Computers)Computer science—MathematicsComputers and civilizationManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Discrete Mathematics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17028Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer communication systems.Operating systems (Computers).Computer science—Mathematics.Computers and civilization.Management information systems.Computer science.Cryptology.Computer Communication Networks.Operating Systems.Discrete Mathematics in Computer Science.Computers and Society.Management of Computing and Information Systems.005.8Joye Marcedthttp://id.loc.gov/vocabulary/relators/edtCryptographers' Track at RSA ConferenceMiAaPQMiAaPQMiAaPQBOOK9910143890003321Topics in Cryptology -- CT-RSA 20032035792UNINA