LEADER 06176nam 22007815 450 001 9910483148603321 005 20251226195610.0 010 $a3-540-30580-7 024 7 $a10.1007/b105124 035 $a(CKB)1000000000212688 035 $a(SSID)ssj0000230445 035 $a(PQKBManifestationID)11218136 035 $a(PQKBTitleCode)TC0000230445 035 $a(PQKBWorkID)10177884 035 $a(PQKB)10124172 035 $a(DE-He213)978-3-540-30580-4 035 $a(MiAaPQ)EBC3068424 035 $a(PPN)123091586 035 $a(BIP)11547989 035 $a(EXLCZ)991000000000212688 100 $a20100705d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPublic Key Cryptography - PKC 2005 $e8th International Workshop on Theory and Practice in Public Key Cryptography /$fedited by Serge Vaudenay 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XIV, 436 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3386 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-24454-9 320 $aIncludes bibliographical references and index. 327 $aCryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol with Pseudoprimes -- Experimenting with Faults, Lattices and the DSA -- Key Establishment -- Securing RSA-KEM via the AES -- One-Time Verifier-Based Encrypted Key Exchange -- Password-Based Authenticated Key Exchange in the Three-Party Setting -- Optimization -- On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods -- Symmetric Subgroup Membership Problems -- Building Blocks -- Optimizing Robustness While Generating Shared Secret Safe Primes -- Fast Multi-computations with Integer Similarity Strategy -- Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order -- Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries -- RSA Cryptography -- Converse Results to the Wiener Attack on RSA -- RSA with Balanced Short Exponents and Its Application to Entity Authentication -- The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity -- From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited -- Multivariate Asymmetric Cryptography -- Tractable Rational Map Signature -- Cryptanalysis of the Tractable Rational Map Cryptosystem -- Large Superfluous Keys in ultivariate uadratic Asymmetric Systems -- Cryptanalysis of HFEv and Internal Perturbation of HFE -- Signature Schemes -- A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible -- Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring -- The Security of the FDH Variant of Chaum?s Undeniable Signature Scheme -- Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions -- Identity-Based Cryptography -- Improved Identity-Based Signcryption -- EfficientMulti-receiver Identity-Based Encryption and Its Application to Broadcast Encryption -- CBE from CL-PKE: A Generic Construction and Efficient Schemes -- Best Paper Award -- A Verifiable Random Function with Short Proofs and Keys. 330 $aThe 2005 issue of the International Workshop on Practice and Theory in Public Key Cryptography (PKC 2005) was held in Les Diablerets, Switzerland during January 23-26, 2005. It followed a series of successful PKC workshops which started in 1998 in Paci'co Yokohama, Japan. Previous workshops were succ- sively held in Kamakura (Japan), Melbourne (Australia), Cheju Island (South Korea),Paris(France),Miami(USA), andSingapore.Since 2003,PKChasbeen sponsoredbytheInternationalAssociationforCryptologicResearch(IACR).As in previous years, PKC 2005 was one of the major meeting points of worldwide research experts in public-key cryptography. I had the honor to co-chair the workshop together with Jean Monnerat and to head the program committee. Inspired by the fact that the RSA cryptosystem was invented on ski lifts, we decided that the best place for PKC was at a ski resort. Jean Monnerat and I hope that this workshop in a relaxed atmosphere will lead us to 25 more years of research fun. PKC 2005 collected 126 submissions on August 26, 2004. This is a record number. The program committee carried out a thorough review process. In - tal, 413 review reports were written by renowned experts, program committee members as well as external referees. Online discussions led to 313 additional discussionmessagesand 238emails. The reviewprocesswasrun using email and the Webreview software by Wim Moreau and Joris Claessens. Every submitted paperreceivedatleast3reviewreports.Weselected28papersforpublicationon October 28, 2004. Authors were then given a chance to revise their submission over the following two weeks. This proceedings includes all the revised papers. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3386 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer networks 606 $aComputers and civilization 606 $aElectronic data processing$xManagement 606 $aCryptology 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aComputers and Society 606 $aIT Operations 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aAlgorithms. 615 0$aComputer networks. 615 0$aComputers and civilization. 615 0$aElectronic data processing$xManagement. 615 14$aCryptology. 615 24$aAlgorithms. 615 24$aComputer Communication Networks. 615 24$aComputers and Society. 615 24$aIT Operations. 676 $a005.8 701 $aVaudenay$b Serge$01752349 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483148603321 996 $aPublic Key Cryptography - PKC 2005$94520657 997 $aUNINA