Skip to content

Public Key Cryptography - Pkc 2003 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, Fl, January 2003 - Proceedings

Spend $50 to get a free movie!

ISBN-10: 354000324X

ISBN-13: 9783540003243

Edition: 2002

Authors: Yvo Desmedt

List price: $79.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $79.99
Copyright year: 2002
Publisher: Springer Berlin / Heidelberg
Publication date: 12/13/2002
Binding: Paperback
Pages: 376
Size: 6.10" wide x 9.25" long x 0.75" tall
Weight: 2.640
Language: English

Diffie-Hellman Based Schemes
Efficient Construction of (Distributed) Verifiable Random Functions
An Identity-Based Signature from Gap Diffie-Hellman Groups
Threshold Cryptography
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
Reduction Proofs
On the Bit Security of NTRUEncrypt
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks
Broadcast and Tracing
Randomness Re-use in Multi-recipient Encryption Schemes
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
Digital Signatures
The Cramer-Shoup Strong-RSA Signature Scheme Revisited
Strong Key-Insulated Signature Schemes
Specialized Multiparty Cryptography
A Verifiable Secret Shuffle of Homomorphic Encryptions
Round-Optimal Contributory Conference Key Agreement
Cryptanalysis I
Security Analysis of the MORCryptosystem
A Practical Attack on Some Braid Group Based Cryptographic Primitives
Elliptic Curves: Implementation Attacks
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
Validation of Elliptic Curve Public Keys
Exceptional Procedure Attack on Elliptic Curve Cryptosystems
Implementation and Hardware Issues
On Montgomery-Like Representations for Elliptic Curves over GF(2<sup>k</sup>)
A Dedicated Sieving Hardware
A Fast and Secure Implementation of Sflash
New Public Key Schemes
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
A Lattice Based Public Key Cryptosystem Using Polynomial Representations
Elliptic Curves: General Issues
The Security of DSA and ECDSA (Bypassing the Standard Elliptic Curve Certification Scheme)
Cryptanalysis II
Side-Channel Attacks on Textbook RSA and ElGamal Encryption
On the Security of HFE, HFEv- and Quartz
Generic Attacks and the Security of Quartz
Author Index