05941nam 22008175 450 991076816380332120200701225954.03-540-40061-310.1007/b94617(CKB)1000000000212270(SSID)ssj0000320909(PQKBManifestationID)11237997(PQKBTitleCode)TC0000320909(PQKBWorkID)10262738(PQKB)11156321(DE-He213)978-3-540-40061-5(MiAaPQ)EBC3087493(PPN)155194658(EXLCZ)99100000000021227020121227d2003 u| 0engurnn|008mamaatxtccrAdvances in Cryptology - ASIACRYPT 2003 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings /edited by Chi Sung Laih1st ed. 2003.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2003.1 online resource (XIV, 550 p.) Lecture Notes in Computer Science,0302-9743 ;2894Bibliographic Level Mode of Issuance: Monograph3-540-20592-6 Includes bibliographical references at the end of each chapters and index.Public Key Cryptography I -- Chosen-Ciphertext Security without Redundancy -- Some RSA-Based Encryption Schemes with Tight Security Reduction -- A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications -- Number Theory I -- Factoring Estimates for a 1024-Bit RSA Modulus -- Index Calculus Attack for Hyperelliptic Curves of Small Genus -- Efficient Implementations -- Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves -- Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p – x + d -- The AGM-X 0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting -- Key Management and Protocols -- Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy -- Leakage-Resilient Authenticated Key Establishment Protocols -- Untraceable Fair Network Payment Protocols with Off-Line TTP -- Hash Functions -- Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking -- New Parallel Domain Extenders for UOWHF -- Cryptanalysis of 3-Pass HAVAL -- Group Signatures -- Efficient Group Signatures without Trapdoors -- Accumulating Composites and Improved Group Signing -- Almost Uniform Density of Power Residues and the Provable Security of ESIGN -- Number Theory II -- Rotations and Translations of Number Field Sieve Polynomials -- On Class Group Computations Using the Number Field Sieve -- Invited Talk -- The Secret and Beauty of Ancient Chinese Padlocks -- Block Ciphers -- A Traceable Block Cipher -- A New Attack against Khazad -- Broadcast and Multicast -- An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack -- Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes -- Foundations and Complexity Theory -- Boneh et al.’s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption -- On Diophantine Complexity and Statistical Zero-Knowledge Arguments -- Verifiable Homomorphic Oblivious Transfer and Private Equality Test -- Public Key Cryptography II -- Generalized Powering Functions and Their Application to Digital Signatures -- Certificateless Public Key Cryptography -- A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems -- The Insecurity of Esign in Practical Implementations -- Digital Signature -- Efficient One-Time Proxy Signatures -- Universal Designated-Verifier Signatures.Lecture Notes in Computer Science,0302-9743 ;2894Data encryption (Computer science)Coding theoryInformation theoryComputer communication systemsOperating systems (Computers)AlgorithmsComputer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Discrete Mathematics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17028Data encryption (Computer science).Coding theory.Information theory.Computer communication systems.Operating systems (Computers).Algorithms.Computer science—Mathematics.Cryptology.Coding and Information Theory.Computer Communication Networks.Operating Systems.Algorithm Analysis and Problem Complexity.Discrete Mathematics in Computer Science.005.8Laih Chi Sungedthttp://id.loc.gov/vocabulary/relators/edtInternational Conference on the Theory and Application of Cryptology and Information SecurityMiAaPQMiAaPQMiAaPQBOOK9910768163803321Advances in Cryptology - ASIACRYPT 20032223512UNINA