05675nam 22008175 450 991014420670332120200706150025.01-280-30691-297866103069163-540-24632-010.1007/b95631(CKB)1000000000212313(SSID)ssj0000230446(PQKBManifestationID)11218137(PQKBTitleCode)TC0000230446(PQKBWorkID)10196396(PQKB)11713216(DE-He213)978-3-540-24632-9(MiAaPQ)EBC3088645(PPN)15517696X(EXLCZ)99100000000021231320121227d2004 u| 0engurnn|008mamaatxtccrPublic Key Cryptography -- PKC 2004 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 /edited by Feng Bao, Robert Deng, Jianying Zhou1st ed. 2004.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2004.1 online resource (XIII, 459 p.) Lecture Notes in Computer Science,0302-9743 ;2947Bibliographic Level Mode of Issuance: Monograph3-540-21018-0 Includes bibliographical references and index.A Generalized Wiener Attack on RSA -- Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem -- Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism -- Application of Montgomery’s Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point -- Fast Arithmetic on Jacobians of Picard Curves -- Undeniable Signatures Based on Characters: How to Sign with One Bit -- Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures -- Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model -- Constant Round Authenticated Group Key Agreement via Distributed Computation -- Efficient ID-based Group Key Agreement with Bilinear Maps -- New Security Results on Encrypted Key Exchange -- New Results on the Hardness of Diffie-Hellman Bits -- Short Exponent Diffie-Hellman Problems -- Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups -- Algebraic Attacks over GF(2 k ), Application to HFE Challenge 2 and Sflash-v2 -- Secret Exponent Attacks on RSA-type Schemes with Moduli N=p r q -- General Group Authentication Codes and Their Relation to “Unconditionally-Secure Signatures” -- From Digital Signature to ID-based Identification/Signature -- Identity-Based Threshold Decryption -- An Efficient Signature Scheme from Bilinear Pairings and Its Applications -- An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications -- A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation -- Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability -- A Point Compression Method for Elliptic Curves Defined over GF(2 n ) -- On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny -- On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? -- QuasiModo: Efficient Certificate Validation and Revocation -- A Distributed Online Certificate Status Protocol with a Single Public Key -- A First Approach to Provide Anonymity in Attribute Certificates -- A Nonuniform Algorithm for the Hidden Number Problem in Subgroups -- Cryptographic Randomized Response Techniques -- A Correct, Private, and Efficient Mix Network.Lecture Notes in Computer Science,0302-9743 ;2947Data encryption (Computer science)Computer communication systemsAlgorithmsComputers and civilizationManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer communication systems.Algorithms.Computers and civilization.Management information systems.Computer science.Cryptology.Computer Communication Networks.Algorithm Analysis and Problem Complexity.Computers and Society.Management of Computing and Information Systems.005.8Bao Fengedthttp://id.loc.gov/vocabulary/relators/edtDeng Robertedthttp://id.loc.gov/vocabulary/relators/edtZhou Jianyingedthttp://id.loc.gov/vocabulary/relators/edtInternational Workshop on Practice and Theory in Public Key CryptographyMiAaPQMiAaPQMiAaPQBOOK9910144206703321Public Key Cryptography -- PKC 20042294811UNINA