Vai al contenuto principale della pagina
Titolo: | Public Key Cryptography : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12–14, 2002 Proceedings / / edited by Pascal Paillier, David Naccache |
Pubblicazione: | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Edizione: | 1st ed. 2002. |
Descrizione fisica: | 1 online resource (XI, 384 p. 1 illus.) |
Disciplina: | 005.8 |
Soggetto topico: | Data encryption (Computer science) |
Algorithms | |
Computer communication systems | |
Cryptology | |
Algorithm Analysis and Problem Complexity | |
Computer Communication Networks | |
Persona (resp. second.): | PaillierPascal |
NaccacheDavid | |
Note generali: | Bibliographic Level Mode of Issuance: Monograph |
Nota di bibliografia: | Includes bibliographical references at the end of each chapters and index. |
Nota di contenuto: | Encryption Schemes -- New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive -- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages -- On Sufficient Randomness for Secure Public-Key Cryptosystems -- Multi-recipient Public-Key Encryption with Shortened Ciphertext -- Signature Schemes -- Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code -- Formal Proofs for the Security of Signcryption -- A Provably Secure Restrictive Partially Blind Signature Scheme -- Protocols I -- M + 1-st Price Auction Using Homomorphic Encryption -- Client/Server Tradeoffs for Online Elections -- Self-tallying Elections and Perfect Ballot Secrecy -- Protocols II -- Efficient 1-Out-n Oblivious Transfer Schemes -- Linear Code Implies Public-Key Traitor Tracing -- Design and Security Analysis of Anonymous Group Identification Protocols -- On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem -- Cryptanalysis -- Solving Underdefined Systems of Multivariate Quadratic Equations -- Selective Forgery of RSA Signatures with Fixed-Pattern Padding -- New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 -- Side Channels -- SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation -- A Combined Timing and Power Attack -- A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks -- Invited Talk -- New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report -- ECC Implementations -- An Improved Method of Multiplication on Certain Elliptic Curves -- An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves -- Weierstraß Elliptic Curves and Side-Channel Attacks -- Applications -- One-Way Cross-Trees and Their Applications -- RSA Key Generation with Verifiable Randomness -- New Minimal Modified Radix-r Representation with Applications to Smart Cards. |
Titolo autorizzato: | Public-Key cryptography |
ISBN: | 3-540-45664-3 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910143916203321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |