LEADER 05415nam 22008295 450 001 9910143640503321 005 20200702175235.0 010 $a3-540-46588-X 024 7 $a10.1007/b75033 035 $a(CKB)1000000000211198 035 $a(SSID)ssj0000326001 035 $a(PQKBManifestationID)11255370 035 $a(PQKBTitleCode)TC0000326001 035 $a(PQKBWorkID)10264899 035 $a(PQKB)11439340 035 $a(DE-He213)978-3-540-46588-1 035 $a(MiAaPQ)EBC3087824 035 $a(PPN)155216406 035 $a(EXLCZ)991000000000211198 100 $a20121227d2000 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPublic Key Cryptography$b[electronic resource] $eThird International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings /$fedited by Hideki Imai, Yuliang Zheng 205 $a1st ed. 2000. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2000. 215 $a1 online resource (XIV, 490 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1751 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-66967-1 320 $aIncludes bibliographical references and index. 327 $aA Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol -- An Efficient NICE-Schnorr-Type Signature Scheme -- Identification of Bad Signatures in Batches -- Some Remarks on a Fair Exchange Protocol -- Gaudry?s Variant against C ab Curves -- An Identification Scheme Based on Sparse Polynomials -- A State-Based Model for Certificate Management Systems -- Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence -- The Composite Discrete Logarithm and Secure Authentication -- Chosen-Ciphertext Security for Any One-Way Cryptosystem -- Short Proofs of Knowledge for Factoring -- Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms -- All-or-Nothing Transform and Remotely Keyed Encryption Protocols -- Security of Public Key Certificate Based Authentication Protocols -- Efficient Implementation of Schoof?s Algorithm in Case of Characteristic 2 -- Key Recovery in Third Generation Wireless Communication Systems -- Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications -- Certificates of Recoverability with Scalable Recovery Agent Security -- Design Validations for Discrete Logarithm Based Signature Schemes -- Optimally Efficient Accountable Time-Stamping -- ?Pseudorandom Intermixing?: A Tool for Shared Cryptography -- RSA-Based Auto-recoverable Cryptosystems -- Efficient and Fresh Certification -- Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions -- Cryptographic Approaches to Privacy in Forensic DNA Databases -- Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes -- Fast Implementation of Elliptic Curve Arithmetic in GF(p n ) -- An Auction Protocol Which Hides Bids of Losers -- Forward Secrecy and Its Application to Future Mobile Communications Security -- Selecting Cryptographic Key Sizes -- A Structured ElGamal-Type Multisignature Scheme. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1751 606 $aData encryption (Computer science) 606 $aComputer programming 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer programming. 615 0$aOperating systems (Computers). 615 0$aAlgorithms. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aProgramming Techniques. 615 24$aOperating Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 676 $a005.8/2 702 $aImai$b Hideki$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZheng$b Yuliang$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Workshop on Practice and Theory in Public Key Cryptography 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143640503321 996 $aPublic-Key cryptography$9744424 997 $aUNINA